International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 112 | Views: 165 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Technology | India | Volume 4 Issue 12, December 2015

Infectious Malware-Analysis and Protective Measures

Harjit Singh [5]

Abstract: Everything Malicious on a Computer is not always Virus; it is Malware i.e. Malicious Software. The viruses are developed by programmers who want to disturb the working of your computer and even want to intentionally cause damage to it. The motive can be to corrupt executable files, corrupt important documents including movies or music files and above that making the system totally unstable. These viruses mostly don't work in secrecy similar to spywares, these are specially designed to target the critical components on the computer and arise serious problems. These viruses work similar to human viruses in the sense that they reproduce themselves, and circulate by attacking the shared files. Other Destructive but Non-Virus Programs are Spyware, Worm, Trojan Horse, Logic Bomb. All these are different from Virus. Malware- General term for any type of unwanted software that infects your computer. This can include viruses and other Non-Virus programs that are destructive in nature. When trying to assess whether a computer system has fallen victim to a virus, logic bomb, worm or Trojan Horse, the main factor to consider is whether the malicious program has the ability to reproduce or not. Only viruses can make copies of themselves and attach the copy to new files.

Keywords: , Malware, Spyware, Worm, Trojan Horse, Logic Bomb, Virus vs. Spyware, Virus vs. Worm, Virus vs. Trojan Horse, Virus vs. Logic Bomb, Symptoms of Virus Infection, Destructive Non-Virus Programs, Virus History, Types of Virus, Life Cycle of Virus

Edition: Volume 4 Issue 12, December 2015,

Pages: 1101 - 1105

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait