Monica has taught college-level courses in Tourism, HR and Adult Education. She has a Master's in Education and is three years into a PhD.
Definition of a Computer Virus
On March 26, 1999, millions of people around the world opened an email they thought was from a friend or colleague. The subject line read, 'important message.' The email was one short sentence suggesting there was a private document for the viewer's eyes only. It sounded serious, but there was a smiley face at the end of the message. When millions of people clicked on the document, a virus called Melissa, named after an erotic dancer in Florida, infected their computer. The virus reached into their computer and stole 50 email addresses to which to send the same message. This is what we call a computer virus.
Computer viruses spread enormously because they are asymptomatic. In other words, they are difficult to detect. You see, a computer virus, also known as a worm, is an unwanted malicious program designed to cause damage to computers on a large scale. So, if a virus looks like a normal email attachment, greeting card, or funny image, people are likely to click on it, and the virus spreads. Beware. . . computer viruses also come in the form of audio, video, and even anti-virus programs!
How the Virus Spreads
The virus can cause damage in many forms. A mild version, like the Melissa virus, can spam other email addresses and social media accounts. Other worms can spread into your computer to delete files, erase hard disks, cause malfunction, and steal private information. Let's look at a more serious virus.
Have you heard of ILOVEYOU, born a year after the Melissa virus? Like Melissa, The ILOVEYOU malware program came in the form of an email attachment. Instead of stealing 50 email addresses, ILOVEYOU stole all of your email addresses. It deleted your images saved as jpeg or jpg and corrupted your music files. It also controlled your Internet browser to make you click on other viruses and shared your passwords. It is estimated that the ILOVEYOU virus caused billions of dollars worth of damages.
There are different types of computer viruses with different techniques. Let's take a look at a few of them:
- Trojan viruses are downloaded and spread other malicious programs and can remotely control the computer it is downloaded on.
- Botnets put infected computers into a network where they can be remotely controlled.
- Scareware uses a disguise to infect a person's computer. It usually looks like a safe anti-virus program.
How to Protect Against
As technology advances, so do hackers. In some cases, hackers outgrow security measures. It's nearly impossible to prevent computer viruses, but there are things you can do to protect yourself. Viruses like Melissa and ILOVEYOU are very common now, making them easier to detect. If you receive a suspicious email, don't open it or download the attachment. They are usually found in your junk folder anyway, so instead of deleting them, report them as spam.
Internet browsers are set up to be very convenient for us. We save our passwords, bank details, and other personal information for 1-click purchases and quick access to frequently visited sites. While it's convenient for us, it's also convenient for hackers. Every few months, you should clear your Internet cache and browsing history. This will also allow you to update your passwords. I know the process sounds tedious, but the time spent speaking with your bank about fraudulent charges is even worse.
New viruses come out every day. This is why your computer and software companies send updates, so make sure you install them. Turn on your pop-up blockers, firewall, and privacy settings, and make sure you install an anti-virus program. The more protection you have, the harder it is for hackers to invade your privacy and interrupt your life.
Computer viruses are so advanced, that even with all the recommended safety measures, it's still not enough. This is why the cyber security industry will reach over $120 billion by 2017. You see, young hackers made the Melissa virus and ILOVEYOU with an interest in seeing how much they could get away with. Now, computer viruses are used for espionage and terrorist acts.
Do you remember the controversy over the movie 'The Interview' produced by Sony Pictures? Hackers took remote control of Sony's employee computers and then denied them access. When employees tried to log in, a screen popped up with a red skeleton and a warning message. Later on, the hackers leaked sensitive emails, personal information, and unreleased movies. Sony lost contracts with movie stars and millions of dollars in revenue, and international relations experienced ongoing tension.
A computer virus is an unwanted malicious program designed to cause damage to computers on a large scale. A virus attacks a computer to spread other malware, allows remote control by unauthorized users, collects private information, erases data, and gains access to other computers. To combat computer viruses, it is recommended that, at a minimum, computers are up-to-date and have installed antivirus programs.
A Few Notes
- Computer viruses are unwanted malicious programs designed to cause damage to computers on a large scale.
- Viruses attack a computer through emails, downloads, and links.
- Viruses can cause damage to computer files, allow remote access to other people, and collect private information.
- Computer viruses are constantly evolving but anti-virus programs that are up-to-date and precautionary measures can reduce the risk of a computer virus gaining entry into a system.
Full understanding of the details of this lesson could enable you to:
- Communicate the definition of a computer virus
- List some of the ways computer viruses can enter a computer
- Enumerate the three types of computer viruses
- Guard against computer viruses
To unlock this lesson you must be a Study.com Member.
Create your account
Register to view this lesson
Unlock Your Education
See for yourself why 30 million people use Study.com
Become a Study.com member and start learning now.Become a Member
Already a member? Log InBack