V I R U S ( Vital Information Resources Under Siege )
It can happen to anyone. Considering the vast number of viruses and malwares traversing the Internet at any given moment, it’s amazing it doesn’t happen to everyone. A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the “boot” sector of the hard drive. Once you know that your machine is infected with a virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), what can you do?
DIFFERENT KIND OF VIRUSES
There are several types of computer viruses that can pose a threat to your identity or the data on your computer. It can be categorized according to their origin, spreading capabilities, techniques, operating system, storage location, files they infect and destructive nature. Let’s elaborate these kinds of viruses along with their effects and protection. Some destructive viruses are :
Ransomware
Trojan Horse
CryptoLocker
Conficker & Code Red
Melissa & ILOVEYOU
Mydoom
Sasser & Zeus
RANSOMWARE MALWARE
Ransomware is computer malware that installs covertly on a victim’s computer, executes a cryptovirology attack that adversely affects it, and demands a ransom payment to decrypt it or not publish it. Simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, and display a message requesting payment to unlock it. More advanced malware encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them.The ransomware may also encrypt the computer’s Master File Table (MFT) or the entire hard drive.Thus, ransomware is a denial-of-access attack that prevents computer users from accessing files since it is intractable to decrypt the files without the decryption key. Ransomware attacks are typically carried out using a Trojan that has a payload disguised as a legitimate file.