Sunteți pe pagina 1din 4

Chapter 2

REVIEW OF RELATED LITERATURES AND STUDIES

This chapter contains the review of related local and foreign literature, review of related

local and foreign researches, synthesis of the reviews, and endnotes for chapter two.

Review of Related Foreign Literature

According to Information Technology Services University of Hawaii (2000), A computer

virus is one of thousands of programs that can invade computer systems (both IBM PC and

Macintosh) and perform a variety of functions ranging from annoying (e.g., popping up

messages such as a joke) to dangerous (e.g., deleting files or destroying your hard disk). Trojan

horses or worms are specific types of clandestine programs (loosely categorized as viruses) and

can be just as dangerous. For simplicity’s sake, future mention of viruses in this document will

refer to viruses, Trojan horses, and worms taken as a whole.

In another study, University of Houston (2018) examined that a computer virus have

impacted a significant number of computers worldwide. A computer virus is a (hidden) program,

which invades your computer. A computer virus contains code that has the potential to cause

damage and/or perform unwanted/unauthorized functions.

Recently, Kevin Judge (2019) gave a comprehensive review on what is a computer virus.

A computer virus is a malicious program that self-replicates by copying itself to another

program. In other words, the computer virus spreads by itself into other executable code or

documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin
control and steal user sensitive data. Hackers design computer viruses with malicious intent and

prey on online users by tricking them.

One of the ideal methods by which viruses spread is through emails – opening the

attachment in the email, visiting an infected website, clicking on an executable file, or viewing

an infected advertisement can cause the virus to spread to your system. Besides that, infections

also spread while connecting with already infected removable storage devices, such as USB

drives.

It is quite easy and simple for the viruses to sneak into a computer by dodging the

defense systems. A successful breach can cause serious issues for the user such as infecting other

resources or system software, modifying or deleting key functions or applications and

copy/delete or encrypt data.

Related Foreign Studies

Related Local Literature

It is a common mistake among computer users to believe that a virus, worm, and a

Trojan horse are the same thing. While they are all malicious program that may harm a

computer, they are different from one another.


A computer virus can spread from computer to computer, usually via an

executable file. According to technology company Cisco, a virus can be activated when a user

opens or runs a malicious host program or file. Once infected, a computer system may

experience a performance reduction or corrupted programs and files.

Unlike a virus, a worm does not attach itself to a program to spread. This type of

malware can self-propagate by exploiting vulnerabilities in the system’s existing security. An

example is the Conficker worm, which can disable critical security and system services of a

computer.

A Trojan horse may look legitimate up front. Once users load or activate it in their

systems, this type of malware can launch various attacks including corrupting files and stealing

information. Security software company AVG Technologies says a Trojan may also create a

backdoor that enables hackers to make changes in the system to steal data.

The Love Letter Virus, also known as the I love you virus, ILOVEYOU, and

Love Letter, was a computer worm originating in the Philippines, which began infecting

computers on May 5, 2000. It spread by e-mail, arriving with the subject line "ILOVEYOU" and

an attachment, "LOVE-LETTER-FOR-YOU.txt.vbs". If the attachment was opened, a Visual

Basic script was executed, and the computer was infected. Many recipients were fooled because

Microsoft Windows concealed the extension of the file, and it was mistaken as a simple text file.

Once executed, the script then e-mailed itself to everyone in the victim's contact list, edited the

Windows Registry to execute the worm at startup, and replaced the data in many computer files,

including JPEG images and Word documents, with copies of itself.


Additional Information the Love Bug was first reported Thursday (05/05/2000)

afternoon Hong Kong time and early morning in Europe and sense then it has been duplicated by

several copycats causing several more additional similar variants to appear. The virus has caused

companies, governments, and end-users extreme grief shutting down mail systems, mail servers,

bank systems and even causing issues with pagers. Within ten days, the virus is estimated to have

infected 10% of all the networked computers in the world, costing $15 billion to remove in the

United States alone. The worm was reported to have come from a couple of the ages 23 and 27

after a raid of their Apartment on Monday (05/08/2000). 05/18/2000 a new virus alert was

announced with the release of the NEWLOVE virus. See information about this virus.

Related Local Studies

S-ar putea să vă placă și