Page 40 - Viva ICSE Computer Studies 7 : E-book
P. 40
Let’s learn about some viruses in detail.
Sweeper
Sweeper is a virus that looks like an antivirus program. This tricks the user into downloading it.
The virus then installs malicious code on the computer by making use of Google services. The
makers of Sweeper created this program as a way to blackmail computer users into disclosing
their credit card information. Once installed, it creates fake malware fi les on the computer,
which get started when the user logs into the system. It manages the browsing activity of the
user. When it is run, the virus fi nishes its fake system scan and reports about fake viruses. The
user should follow the steps properly to remove this malicious code.
Malware
Malware is made up of two words: malicious and software. It refers to a program or fi le that
is harmful to a computer. It includes computer viruses, worms, Trojan horses and spyware.
These malicious programs can perform a variety of functions including stealing, encrypting or
deleting sensitive data, altering or hijacking core computing functions, and monitoring users’
computer activity without their permission.
Computer Worms
A worm is a small software program that uses computer networks and takes advantage of
security weaknesses to replicate. The worm sends its fi les through the network cables that
connect many computers. When the security is weak, the computer that is linked to the infected
computer also gets aff ected. Worms are similar to computer viruses, but are less eff ective and
are easy to remove. These viruses replicate themselves and reduce the system’s performance.
Trojan Horse
The name Trojan horse is derived from the wooden horse that was used by the Greek army to
conquer the city of Troy. Trojan horse is a computer program that tricks the user by acting as an
original fi le. This virus does not replicate itself and is designed to perform targeted activities.
When the user opens the fi le, the virus starts the program automatically and begins to infect
the system. It tends to act discretely and creates backdoors in your security to let other malware
in. A Trojan horse does not replicate, but it does a lot of damage to your computer every time
you open and run it, like changing the desktop by adding desktop icons of its own.
Spyware
Spyware is a kind of malware that is designed to collect information and data on users and
observe their activity without their knowledge. Such programs can collect personal information
like passwords and credit card information. It can
also change the computer’s settings, resulting in Think and Discuss
slow speed. Spyware is sometimes also referred
to as a tracking software. In the workplace, such Can spyware be installed in children’s
computer system? What will be the use of
software may be installed on corporate laptops
spyware in such a case?
28