Page 140 - DCAP516_COMPUTER_SECURITY
P. 140

Computer Security




                    Notes              (e)  Sparse infector: The term ‘sparse infector’ is used for a virus that infects only
                                            occasionally, e.g. every 7th executed file or only files whose size fall within a defined
                                            range etc. By infecting less often, such viruses try to minimize the probability of
                                            being discovered by the user.
                                       (f)  Companion virus: A companion virus is one that, instead of modifying an existing
                                            file, creates a new program, which (unknown to the user) gets executed by the
                                            command-line interpreter instead of the intended program. On exit, the new program
                                            executes the original program so things appear normal. This is done by creating an
                                            infected .COM file with the same name as an existing .EXE file. This type of malicious
                                            code is not always considered to be a virus, since it does not modify existing files.
                                       (g)  Macro virus: A macro is a series of commands to perform an application-specific task.
                                            Those commands can be stored as a series of keystrokes or in a special macro language.
                                            It is a virus that spreads through only one type of program, usually either Microsoft
                                            Word or Microsoft Excel. It can do this because these types of programs contain auto
                                            open macros, which automatically run when user opens a document or a spreadsheet.
                                            Along with infecting auto open macros, the macro virus infects the global macro
                                            template, which is executed anytime the program is run. Thus, once the global
                                            macro template is infected, any file which user opens becomes infected and the virus
                                            spreads. The macro virus is easy to detect and to deactivate.
                                       (h)  Virus hoax: A virus hoax generally appears as an e-mail message that describes a
                                            particular virus that does not exist. Such messages are designed to panic computer
                                            users. The writer e-mails the warning and includes a plea for the reader to forward
                                            it to others. The message then acts much like a chain letter, propagating throughout
                                            the Internet as individuals receive it and then innocently forward it. The best thing
                                            to do on receipt of such an e-mail is to ignore and delete it.
                                       (i)  Standard virus: A standard virus resides in memory where its payload executes in
                                            three stages:
                                            (i)  Staying in memory as a resident process
                                            (ii)  Detecting programs that are loaded into the computer’s memory
                                            (iii)  Attaching itself into an available slot of that program, mostly at the end, that
                                                 resides on hard disk or floppy.
                                            The medium should not be protected against writing. As far as is known, there is no
                                            virus that breaks this hardware security. Even more advanced viruses try to attack
                                            domains of other users on the network by cracking the passwords and repeat the
                                            process.
                                            Some viruses are only specialized at cracking firewalls, deleting files, sending
                                            hundreds of thousands of mails, steel addresses from user’s mailbox and send them
                                            to a secret recipient.
                                   9.  Worms: Viruses are programs that attach themselves to a computer or a file and then
                                       circulate themselves to other files and to other computers on a network. They usually
                                       affect the data on a computer, either by altering or deleting it. Computer worms, unlike
                                       viruses do not need the host to attach themselves to. They merely make functional copies
                                       of themselves and do this repeatedly till they wipe all the available space on a computer’s
                                       memory.
                                       A computer worm is a self-contained program or a set of programs that is able to spread
                                       functional copies of itself or its segments to other computer systems usually via network
                                       connections. There are two types of worms - host computer worms and network worms.



          134                               LOVELY PROFESSIONAL UNIVERSITY
   135   136   137   138   139   140   141   142   143   144   145