Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Virus Classification - Coggle Diagram
Computer Virus Classification
Macro/MAC Virus
virus which spreads to other computers through software programs that utilize macros.
These viruses infect the files created using some applications or programs that contain macros such as doc, pps, xls and mdb.
Infects programs like Microsoft Word and Excel. Spreads via documents, both within a computer and across networks. Hides in shared documents (e.g., via email).
Automatically infects files, templates, and documents with malicious macros.
They usually fix themselves inside the computer memory and get activated during the start of OS and end up infecting other opened files. They are hidden in RAM.
Example : Relax, Melissa.A, Bablas, O97M/Y2K.
Cross-Site Scripting Virus(XSS)
Targets web applications that accept user input.
Occurs when data and executable code aren't properly separated.
Uses a vulnerable website to deliver malicious scripts to a user's browser.
The malicious script executes automatically during page loading, making the attack unavoidable for the user.
Example: Java-Script
Worms
Similar to a virus, it can self-replicate and infect a computer.
It is an independent program, unlike a virus which attaches to another program.
It travels by storing itself in critical disk areas, from where it loads and it carries code to transfer itself outward from the infected system.
It has been known to damage and infect entire LANs.
It does not modify a program but it replicates so much that it consumes computer resources, making it slow.
Example: Lovgate.F, Sobig.D, Trile.C, PSWBugbear.B, Mapson, Code Red, Nimda.
Trojan Horse
hidden malicious code that could alter or delete the
information of client computer or perform any other unauthorized function.
contain programs that corrupt the data or damage the files.
Can corrupt the software applications.
Can illegally trace important login details of users online – for example E-Banking.
Does not replicate themselves like viruses and do not infect other software.
Brought in from outside by unsuspecting users through other programs.
Activities of Trojans are: Deleting data, Blocking data, Modifying data, Copying data, Disrupting the performance of computers or computer networks