11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

computer virus 111programmed into a virus is to reproduce itself, a virus programcan spread rapidly. Viruses are generally programmedto seek out program files that are likely to be executed inthe near future, such as those used by the operating systemduring the startup process. The result is a copy that canin turn generate an additional copy, <strong>and</strong> so on. (A virusdisguised as an innocuous program is sometimes calleda Trojan, short for “Trojan horse.” A distinction is sometimesmade between viruses <strong>and</strong> worms. A worm generallyuses flaws in a networking system to send copies to othermachines, without needing to insert code into a program.)Appearing in the 1980s, the first computer viruses weregenerally spread by infecting programs on floppy disks,which were <strong>of</strong>ten passed between users. Today, viruses generallyhave instructions that enable them to gain access tonetwork facilities (such as e-mail) to facilitate their spreadingto other systems on a local network or on the Internet.The spread <strong>of</strong> viruses is complicated by the fact that operatingsystems (particularly Micros<strong>of</strong>t Windows) <strong>and</strong> applications(such as Micros<strong>of</strong>t Office) have the ability to runscripts or “macros” that are attached to documents. Thisfacility can be useful for tasks such as sophisticated documentformatting or form-h<strong>and</strong>ling, but it also means thatviruses can attach themselves to scripts or macros <strong>and</strong> runwhenever a document containing them is opened. Sincemodern e-mail programs have the ability to include documentsas attachments to messages, this means that theunsuspecting recipient <strong>of</strong> a message can trigger a virus simplyby opening a message attachment.In today’s Web-centric world, viruses are <strong>of</strong>ten spreadusing links in e-mail that either entices or frightens thereader into clicking on a link to a Web site, which canbe made to closely resemble that <strong>of</strong> a legitimate institutionsuch as a bank or e-commerce site (see phishing <strong>and</strong>spo<strong>of</strong>ing). Once connected to the site, the user’s computercan be infected with a virus or with some other form <strong>of</strong>“malware” (see spyware <strong>and</strong> adware). This route <strong>of</strong> infectionis particularly dangerous because normal antivirusprograms scan e-mail but not data being downloaded froma Web site, <strong>and</strong> firewalls are generally set to allow normalWeb requests.Once installed, a virus can be used for a variety <strong>of</strong> purposesaccording to the “payload” <strong>of</strong> instructions that areset to execute. Sensitive information such as credit carddetails can be stolen (see identity theft). Sometimes theinfected computer can appear to be unaffected, but has hada stealthy “bot” (robot) program inserted. Thous<strong>and</strong>s <strong>of</strong>bots can be linked into a “botnet” <strong>and</strong> later comm<strong>and</strong>ed totrigger large-scale “distributed denial <strong>of</strong> service” (DDOS)attacks to flood targeted Web sites with requests, crashingor disabling the site.Viruses can be further disguised by programming themto remain dormant until a certain date, time, or other conditionis reached. (Such a virus is sometimes called a logicbomb.) For example, a disgruntled programmer who isabout to be dismissed might insert a virus that will wipeout payroll data at the beginning <strong>of</strong> the next month. Afamous example <strong>of</strong> the time-triggered virus was the Michelangelovirus, so named because it was triggered to run onthe artist’s birthday, March 6, 1992. (See computer crime<strong>and</strong> security.)Viruses can be overtly destructive (such as by reformattinga computer’s hard drive, wiping out its data). Otherviruses can simply tie up system resources. The most infamousexample <strong>of</strong> this was the “Internet Worm” introducedonto the network on November 2, 1988, by Robert Morris,Jr. This program was intended to reproduce slowly, plantingits “segments” on networked computers by exploiting aflaw in the UNIX sendmail program. Unfortunately, Morrismade an error that caused the worm to spread much morerapidly. Before the coordinated efforts <strong>of</strong> system administratorsat affected sites came up with countermeasures, theworm had cost somewhere in the hundreds <strong>of</strong> thous<strong>and</strong>s <strong>of</strong>dollars in lost computer <strong>and</strong> programmer time.CountermeasuresThe only certain defense <strong>of</strong> a computer system from viruseswould be through abstaining from contact between it <strong>and</strong>any other computers, either directly through a network orindirectly through exchange <strong>of</strong> programs on floppy disksor other removable media. In today’s highly networkedworld, this is usually impractical. A more practical defenseis to install antivirus s<strong>of</strong>tware. Antivirus programs workby comparing the contents <strong>of</strong> files (either those already onthe disk or entering via the Internet) with “signatures” orpatterns <strong>of</strong> data found in known viruses. More sophisticatedantivirus programs include the ability to recognizeprogram code that is similar to that found in known virusesor that attempts suspicious operations (such as attempts toreformat a disk or bypass the operating system <strong>and</strong> writedirectly to disk). If an antivirus program recognizes a virus,it warns the user <strong>and</strong> can be told to actually remove thevirus. Because dozens <strong>of</strong> new viruses are identified eachweek, virus programs must be updated frequently with newvirus signature files in order to remain effective. Many antivirusprograms can update themselves by periodically linkingto a Web site containing the update files.Modern operating systems (such as Micros<strong>of</strong>t WindowsVista) have attempted to make it harder for unauthorizedprograms to access critical system files, such as by limitingdefault access permissions or prompting the user toapprove various activities. Such operating systems alsoinclude an updating feature that can automatically download<strong>and</strong> install security “patches”—a vital task, as can beseen from the volume <strong>and</strong> variety <strong>of</strong> such updates that seemto appear every month. Indeed the use <strong>of</strong> “blended” threats(including more than one potential infection mechanism)<strong>and</strong> the development <strong>of</strong> new “exploits” for hundreds <strong>of</strong> differentdata file formats make system protection an ongoingchallenge.Reducing user temptation <strong>and</strong> enhancing user awarenessis also important. Since unsolicited e-mail (see spam)is <strong>of</strong>ten a source <strong>of</strong> potentially malicious links <strong>and</strong> attachments,running a spam-blocking program can help protectthe computer. There are also programs that can detect<strong>and</strong> block “phishing” messages <strong>and</strong> their related Web sites.Since none <strong>of</strong> these programs can completely keep up withthe rapid appearance <strong>of</strong> new threats, caution <strong>and</strong> common

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!