Page 40 - Viva ICSE Computer Studies 7 : E-book
P. 40

Let’s learn about some viruses in detail.
                    Sweeper

                    Sweeper is a virus that looks like an antivirus program. This tricks the user into downloading it.
                    The virus then installs malicious code on the computer by making use of Google services. The
                    makers of Sweeper created this program as a way to blackmail computer users into disclosing
                    their credit card information. Once installed, it creates fake malware fi les on the computer,
                    which get started when the user logs into the system. It manages the browsing activity of the
                    user. When it is run, the virus fi nishes its fake system scan and reports about fake viruses. The
                    user should follow the steps properly to remove this malicious code.

                    Malware

                    Malware is made up of two words: malicious and software. It refers to a program or fi le that
                    is harmful to a computer. It includes computer viruses, worms, Trojan horses and spyware.
                    These malicious programs can perform a variety of functions including stealing, encrypting or
                    deleting sensitive data, altering or hijacking core computing functions, and monitoring users’
                    computer activity without their permission.

                    Computer Worms

                    A worm is a small software program that uses computer networks and takes advantage of
                    security weaknesses to replicate. The worm sends its fi les through the network cables that
                    connect many computers. When the security is weak, the computer that is linked to the infected
                    computer also gets aff ected. Worms are similar to computer viruses, but are less eff ective and
                    are easy to remove. These viruses replicate themselves and reduce the system’s performance.

                    Trojan Horse

                    The name Trojan horse is derived from the wooden horse that was used by the Greek army to
                    conquer the city of Troy. Trojan horse is a computer program that tricks the user by acting as an
                    original fi le. This virus does not replicate itself and is designed to perform targeted activities.
                    When the user opens the fi le, the virus starts the program automatically and begins to infect
                    the system. It tends to act discretely and creates backdoors in your security to let other malware
                    in. A Trojan horse does not replicate, but it does a lot of damage to your computer every time
                    you open and run it, like changing the desktop by adding desktop icons of its own.

                    Spyware

                    Spyware is a kind of malware that is designed to collect information and data on users and
                    observe their activity without their knowledge. Such programs can collect personal information
                    like passwords and credit card information. It can
                    also change the computer’s settings, resulting in                  Think and Discuss
                    slow speed. Spyware is sometimes also referred
                    to as a tracking software. In the workplace, such         Can spyware be installed in children’s
                                                                              computer system? What will be the use of
                    software may be installed on corporate laptops
                                                                              spyware in such a case?



                     28
   35   36   37   38   39   40   41   42   43   44   45