Page 68 - Code Craft Computer-7
P. 68
Virus
Computer Virus stands for Vital Information Resources Under Seize . A computer virus is a human
made malicious program or a part of a code that is entered into a computer without the knowledge
of the end user. It infects computers, servers, websites, and software.
Virus is one of the most widely known malware. It is designed to replicate and spread. Virus
continuously multiplies itself on an infected computer by making copies of it. It infects all or
many other software on the host system. Virus is contagious in nature. It spreads from one system
to another when software is shared between them.
Viruses, such as Boot sector virus, Program file virus, and Multipartite virus are hidden in items
like start up area or executable files, so that they cannot be detected by the end user. Some viruses
stay inactive until they receive a specific signal to trigger them.
Some viruses remain active in the memory as long as the computer is on. As soon as the computer
is turned off, this virus is removed from the system's memory. However, they are not removed any
infected file or disk. It means when the system is restarted, the virus gets activated. These viruses
could infect other files and programs in the system. The bottom line is that viruses are harmful for
a system, but not all viruses are destructive.
Cyber Vandalism
The word vandalism refers to destruction of anything important. Therefore, the term cyber
vandalism refers to an illegal act of destroying or damaging digital data, rather than stealing or
misusing it. Tampering of the online content of a website also falls under cyber vandalism.
The main motive behind cyber vandalism is maligning the image or reputation of a business
house. Cyber vandalism could negatively impact business houses, brands, and their goodwill.
Cyber vandals are people who create malware to damage electronic files. They also create
elements that can disable data, computer systems, or networks.
Hacking
Hacking is a crime involving cracking systems or networks to gain unauthorised access to the
data stored in them. A person who engages in hacking is called a hacker. Hackers can be classified
into two categories on the basis of the intent.
• Ethical Hackers: They are also known as White Hat hackers . Ethical hacking refers to non-
malicious activity. The aim of this kind of hacking is to find the loopholes or weaknesses of a
computer network or system. These operations are performed to test the vulnerability of a
network. Later, these problems are fixed to improve the network security. Ethical hacking is
done with prior consent of the network owners.
• Crackers: They are also known as Black Hat hackers . These hackers gain unauthorised
access to a computer system with a malicious intent. The aim of a cracker is to steal financial
or personal information, transfer funds from bank accounts, and so on.
Cybersquatting
Cybersquatting is perpetrated against business houses, especially businesses that have a large web
presence. It is an act of registering, selling, or using a domain name that is deliberately named
68

