Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Virus Classification, Creates duplicate files with a .com…
Computer Virus Classification
Boot Sector Viruses
Infected code runs when the system is booted from an infected disk.
Boot sector viruses infects master boot record or hard disks at the BIOS level and spread via floppy disks,are now largely obsolete due to the disappearance of floppy drives.
The computer is infected by this virus only if the virus is used to boot up the system
Once the operating system has booted, boot-sector viruses can no longer infect the computer due to built-in safeguards.
Example: Polyboot.B, Joshi, Gravity, AntiEXE and Cbrain virus.
Companion Virus
Spread mainly in the MS-DOS era; rare today.
Examples: Stator, Asimov.1539, Terrax.1069.
Email Virus
Virus which is attached to email communications or sent with it.
Email viruses operate in various ways, and a range of methods are used to fight these challenging cyberattacks.
Ways email viruses can vary
Unknown Sender/Silly Subject: The email sender may be unfamiliar, or the subject line might contain nonsensical text.
Disguised Sender: The email might be cleverly disguised as coming from a known and trusted sender.
Logic Bomb/Time Bombs
Small malicious programs to cause harm at a certain point of time but they do not replicate.
They're not standalone programs, but camouflaged segments within others.
Programmed for sabotage or revenge, often targeting databases.
Implemented by individuals who anticipate being absent when the harmful effects (e.g., data deletion) occur.
Triggers a malicious action under specific conditions.
Often installed by insiders with system access, it can be programmed to delete critical code (e.g., upon programmer termination). Often Used as a form of revenge or sabotage.
Creates duplicate files with a .com extension instead of modifying originals.
Harder to detect as it doesn’t alter existing files.