Computer Viruses and Worms

Robert Slade, Vancouver Institute for Research into User Security, Canada

Introduction

History of Computer Viruses and Worms

Virus Definition

Is My Computer Infected? What Should I Do?

Trojan Horses, Viruses, Worms, RATs, and Other Beasts

Trojans

Worms

Viruses

Logic Bombs

Other Related Terms

First Generation Viruses

Boot Sector Viruses

File Infecting Viruses

Polymorphic Viruses

Virus Creation Kits

Macro Viruses

What Is a Macro?

Free Technology to Avoid Macro Viruses

E-Mail Viruses

The Start of E-Mail Viruses: Melissa

How to Avoid E-Mail Viruses

Worms (First and Third Generation)

Detection Techniques

String Search (Signature-Based)

Change Detection (Integrity Checking)

Real-Time Scanning

Heuristic Scanning

Permanent Protection

Vaccination

Activity Monitoring (Behavior-Based)

Prevention and Protection Techniques

Non-PC Platform Viruses

Conclusion

Glossary

Cross References

Further Reading

INTRODUCTION

Computer viruses are unique among the many security problems in that the fact that someone else is infected increases the risk to you. However, viruses also seem to be surrounded by myths and misunderstandings. It is hoped this chapter will help to set the record straight.

History of Computer Viruses and Worms

Many claims have been made for the existence of viruses prior to the 1980s, but, so far, these claims have not been accompanied by proof. The Core Wars programming contests did involve self-replicating code, but usually within a structured and artificial ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.