Documente Academic
Documente Profesional
Documente Cultură
This chapter contains the review of related local and foreign literature, review of related
local and foreign researches, synthesis of the reviews, and endnotes for chapter two.
virus is one of thousands of programs that can invade computer systems (both IBM PC and
Macintosh) and perform a variety of functions ranging from annoying (e.g., popping up
messages such as a joke) to dangerous (e.g., deleting files or destroying your hard disk). Trojan
horses or worms are specific types of clandestine programs (loosely categorized as viruses) and
can be just as dangerous. For simplicity’s sake, future mention of viruses in this document will
In another study, University of Houston (2018) examined that a computer virus have
which invades your computer. A computer virus contains code that has the potential to cause
Recently, Kevin Judge (2019) gave a comprehensive review on what is a computer virus.
program. In other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin
control and steal user sensitive data. Hackers design computer viruses with malicious intent and
One of the ideal methods by which viruses spread is through emails – opening the
attachment in the email, visiting an infected website, clicking on an executable file, or viewing
an infected advertisement can cause the virus to spread to your system. Besides that, infections
also spread while connecting with already infected removable storage devices, such as USB
drives.
It is quite easy and simple for the viruses to sneak into a computer by dodging the
defense systems. A successful breach can cause serious issues for the user such as infecting other
It is a common mistake among computer users to believe that a virus, worm, and a
Trojan horse are the same thing. While they are all malicious program that may harm a
executable file. According to technology company Cisco, a virus can be activated when a user
opens or runs a malicious host program or file. Once infected, a computer system may
Unlike a virus, a worm does not attach itself to a program to spread. This type of
example is the Conficker worm, which can disable critical security and system services of a
computer.
A Trojan horse may look legitimate up front. Once users load or activate it in their
systems, this type of malware can launch various attacks including corrupting files and stealing
information. Security software company AVG Technologies says a Trojan may also create a
backdoor that enables hackers to make changes in the system to steal data.
The Love Letter Virus, also known as the I love you virus, ILOVEYOU, and
Love Letter, was a computer worm originating in the Philippines, which began infecting
computers on May 5, 2000. It spread by e-mail, arriving with the subject line "ILOVEYOU" and
Basic script was executed, and the computer was infected. Many recipients were fooled because
Microsoft Windows concealed the extension of the file, and it was mistaken as a simple text file.
Once executed, the script then e-mailed itself to everyone in the victim's contact list, edited the
Windows Registry to execute the worm at startup, and replaced the data in many computer files,
afternoon Hong Kong time and early morning in Europe and sense then it has been duplicated by
several copycats causing several more additional similar variants to appear. The virus has caused
companies, governments, and end-users extreme grief shutting down mail systems, mail servers,
bank systems and even causing issues with pagers. Within ten days, the virus is estimated to have
infected 10% of all the networked computers in the world, costing $15 billion to remove in the
United States alone. The worm was reported to have come from a couple of the ages 23 and 27
after a raid of their Apartment on Monday (05/08/2000). 05/18/2000 a new virus alert was
announced with the release of the NEWLOVE virus. See information about this virus.