A virus requires a legitimate program or file to attach to, much like a medical virus requires cells to host it.
Typically, a virus will remain inactive, attached to the host program or file, until something causes the virus to become active, which might be the program being run or the file being access or opened.
How does a computer virus work?
A virus needs a host program or file in order to run (or 'execute').
When the program or file is accessed, the computer is instructed to execute certain operations to fulfil the instruction, and in turn the virus can also execute.
How does a Virus Spread?
Viruses can be spread through email attachments, visits to websites, downloaded files and links in emails or other messages.
When a virus executes on a computer, it will perform malicious tasks on that computer (called 'releasing the payload'), but will also seek a means of spreading or propagating to other parts of the infected computer, and to other computers.
Malware takes its name from the contraction of two words, malicious software. Malware comes in many different forms and can be described as software that has been written with the intent of doing damage in some way. There are various different types of malicious software, or 'malware', including:
Adware
A type of malware that tracks user activity (e.g. browser usage and downloads) with the intention of delivering advertising, which is often difficult to close.
Botnet
A botnet (from robot network) is a type of malware attack using multiple separate computers that have been infected and commanded by the attacker.
Keylogger
A keylogger can monitor a great deal of user activity, including email, browsing activity, program use and keystrokes, which can be used to acquire usernames and passwords.
Cryptocurrency miner
A miner (or 'cryptojacker') is designed to harness the computing power of the infected machine to generate cryptocurrency (e.g. Bitcoin) for the attacker.
Ransomware
A type of malware that infects the computer, but rather than causing damage, it encrypts data and demands payment (the 'ransom') in return for decrypting it.
Rootkit
A set of software tools designed to allow an attacker to gain unauthorised access - often elevated (e.g. administrator level) access - to a computer without being detected.
Spyware
A little like adware, spyware is a type of malware that monitors user activity and transmits this data to the attacker without the user's knowledge.
Trojan
Disguised as legitimate software, a trojan misleads the user in to executing it and allowing the payload to be deployed, which may include a 'backdoor' that an attacker can use to gain access.
Virus
A type of malware that attaches itself to legitimate programs or files, and replicates itself in order to 'infect' the computer and deploy the payload.
Worm
Unlike a virus, a worm can self-replicate without needing a host program or file, and often spreads without any user action, usually exploiting weaknesses (or 'vulnerabilities') in security measures.
How does Star Academies Protect their computer devices?
Star Academies have enabled Microsoft Windows Defender Advanced Threat Protection on computer devices to protect devices from Virus and malware infections.
It is important to ensure that the computer devices are restarted regularly so that Anti Virus updates files are downloaded to help keep the computer safe.
Below are twelve key steps to get some information security fundamentals in place:
Backups
Backup systems and data, including an off-site backup
Updates
Update key software, particularly operating systems and productivity software
Security
Update security software
Emails
Take caution with unexpected or suspicious emails
Access Rights
Ensure that user accounts do not have higher privileges than really needed (particularly 'administrator' level)
Passwords
Ensure strong passwords are used, and that passwords are never revealed to anyone else
File Types
Take care with certain file types (e.g. .exe) and ensure known sources (e.g. Google Play Store for Android)
Unknown Code
Prevent unwanted code from running (e.g. disabling macros) and ensure antivirus software is scanning in real time
Security
Ignore instructions in emails or files to disable any security software or enable features (e.g. macros)
Network Security
Ensure wireless networks use WPA2 and wired networks are segmented
Training
Provide security awareness and data protection training to staff on a regular basis
Planning
Take time to develop plans in advance (including a 'business continuity and disaster recovery' plan)