Downloads: 112 | Views: 249 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 4 Issue 12, December 2015 | Popularity: 6.4 / 10
Infectious Malware-Analysis and Protective Measures
Harjit Singh
Abstract: Everything Malicious on a Computer is not always Virus; it is Malware i.e. Malicious Software. The viruses are developed by programmers who want to disturb the working of your computer and even want to intentionally cause damage to it. The motive can be to corrupt executable files, corrupt important documents including movies or music files and above that making the system totally unstable. These viruses mostly don't work in secrecy similar to spywares, these are specially designed to target the critical components on the computer and arise serious problems. These viruses work similar to human viruses in the sense that they reproduce themselves, and circulate by attacking the shared files. Other Destructive but Non-Virus Programs are Spyware, Worm, Trojan Horse, Logic Bomb. All these are different from Virus. Malware- General term for any type of unwanted software that infects your computer. This can include viruses and other Non-Virus programs that are destructive in nature. When trying to assess whether a computer system has fallen victim to a virus, logic bomb, worm or Trojan Horse, the main factor to consider is whether the malicious program has the ability to reproduce or not. Only viruses can make copies of themselves and attach the copy to new files.
Keywords: , Malware, Spyware, Worm, Trojan Horse, Logic Bomb, Virus vs. Spyware, Virus vs. Worm, Virus vs. Trojan Horse, Virus vs. Logic Bomb, Symptoms of Virus Infection, Destructive Non-Virus Programs, Virus History, Types of Virus, Life Cycle of Virus
Edition: Volume 4 Issue 12, December 2015
Pages: 1101 - 1105
DOI: https://www.doi.org/10.21275/NOV152133
Make Sure to Disable the Pop-Up Blocker of Web Browser