ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Infectious Malware-Analysis and Protective Measures

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 12)

Publication Date:

Authors : ;

Page : 1101-1105

Keywords : Virus; Malware; Spyware; Worm; Trojan Horse; Logic Bomb; Virus vs Spyware; Virus vs Worm; Virus vs Trojan Horse; Virus vs Logic Bomb; Symptoms of Virus Infection; Destructive Non-Virus Programs; Virus History; Types of Virus; Life Cycle of Virus;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Everything Malicious on a Computer is not always Virus, it is Malware i. e. Malicious Software. Viruses are designed to run helter-skelter through your computer and caused actual, intentional damage to the computer itself. This can be in the form of corrupting files on your computer, damaging your personal documents, photos, music track, and more to rendering the computer completely unusable. Viruses usually don't have an ulterior motive like spy ware programs do, they are made to maliciously damage your computer and cause you problems. Like human viruses, computer viruses also replicate themselves, and spread by embedding into email attachments and other shared files. Other Destructive but Non-Virus Programs are Spyware, Worm, Trojan Horse, Logic Bomb. All these are different from Virus. Malware- General term for any type of unwanted software that infects your computer. This can include viruses and other Non-Virus programs that are destructive in nature. When trying to assess whether a computer system has fallen victim to a virus, logic bomb, worm or Trojan Horse, the main factor to consider is whether the malicious program has the ability to reproduce or not. Only viruses can make copies of themselves and attach the copy to new files.

Last modified: 2021-07-01 14:28:06