Vous êtes sur la page 1sur 34

Term Rogue software Computer Virus Anti-virus Software

Meaning a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware, or that installs other malware. a computer program that can copy itself and infect a computer. software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, Trojan horses, spyware and adware. a person who commits burglary; housebreaker.

Burglars

Computer crimes can be carried out by outsiders or insiders. In most cases, intellect not force is needed to commit such crime.

Stealing Computer theft of funds Stealing computer time

The fear brought about by the idea that someone-be it the government or other entities- are using information stored in computer systems for their own intentions.

Any program that runs on a computer without prior consent or knowledge of the user.

An actual self-replicating program was created by

Fred Cohen.
It is called computer virus.

As mentioned before, the computer virus is the most popular and widely distributed type of rogue software. There are three definitions which are used to define computer virus.

It stands for Vital Information Resource Under Siege. A program which can replicate itself without infecting any host program. A program that duplicates itself by infecting other program.

File virus Boot-sector virus Multipartite virus Macro virus E-mail worm Denial-of-service attack Hoax

A virus can be triggered to cause destruction in several different ways:

Randomly-triggered viruses are designed to attack at random. Date-activated viruses wait for a pre-defined date before it strikes. Boot-count viruses will count the number of times the computer is booted. Time-since viruses attacks after the computer is left open for a specified period of time. Keystroke-triggered viruses will activate itself after a predefined number of keystrokes.

type of virus that infects files saved on a computer system, typically executable (EXE) and/or command (COM) files.

Depending on the file type infected, a file virus may also be referred to as an EXE infector or a COM infector. Though viruses exist that target other system components - BAT or REG viruses, for example - the most common type of virus today is an EXE infector.

A file virus can also be classified based on whether it is memory resident and non-memory resident. Memory resident viruses stay active in memory, trap one or more system functions (usually interrupt 21h or Windows file system hooks) and infect files while they are accessed. Non-memory resident viruses search for EXE files on a hard disk and infect them.

A boot sector virus is a computer virus which infects the boot sector on hard disks, floppy disks, and theoretically also other bootable media such as CDs and DVDs.

A boot sector virus does not need to be able to successfully boot the victims computer to infect it. Because of this, even non-bootable media can spread a boot sector virus.

Once the infected computer successfully boots, the boot sector virus stays in memory and infects floppies and other media when they are written to by the infected computer.

A multipartite virus is a computer virus that infects and spreads in multiple ways. The term was coined to describe the first viruses that included DOS executable files and PC BIOS boot sector virus code, where both parts are viral themselves.

For a complete cleanup, all parts of the virus must be removed. The term was coined, as prior to the discovery of the first of these, viruses were categorized as either file infectors or boot infectors. Because of the multiple vectors for the spread of infection, these viruses could spread faster than a boot or file infector alone.

In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails.

A macro virus can be spread through e-mail attachments, discs, networks, modems, and the Internet and is notoriously difficult to detect

According to some estimates, 75% of all viruses today are macro viruses.

A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention.

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services.[3] Attacks can be directed at any network device, including attacks on routing devices and web, electronic mail, or Domain Name System servers.

A computer virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain email that tells the recipient to forward it to everyone they know.

Virus hoaxes are usually harmless and accomplish nothing more than annoying people who identify it as a hoax and waste the time of people who forward the message. Nevertheless, a number of hoaxes have warned users that vital system files are viruses and encourage the user to delete the file, possibly damaging the system. Examples of this type include the jdbgmgr.exe virus hoax and theSULFNBK.EXE hoax

Preparation Prevention Detection Containment Recovery

Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware.

Anti-Virus McAfee VirusScan Sophos Anti-Virus AVG Panda Cloud Avira


Norton

Vous aimerez peut-être aussi