Podcast
Questions and Answers
How do viruses typically spread?
How do viruses typically spread?
What type of files do direct action viruses typically attach themselves to?
What type of files do direct action viruses typically attach themselves to?
What is a characteristic of direct action viruses?
What is a characteristic of direct action viruses?
What is the impact of direct action viruses on a user's system?
What is the impact of direct action viruses on a user's system?
Signup and view all the answers
What is a characteristic of resident viruses?
What is a characteristic of resident viruses?
Signup and view all the answers
What type of resident viruses cause as much damage as quickly as possible?
What type of resident viruses cause as much damage as quickly as possible?
Signup and view all the answers
What can resident viruses potentially do to anti-virus software?
What can resident viruses potentially do to anti-virus software?
Signup and view all the answers
What has led to a reduction in the prevalence of viruses?
What has led to a reduction in the prevalence of viruses?
Signup and view all the answers
What is the primary consequence of software piracy for publishers?
What is the primary consequence of software piracy for publishers?
Signup and view all the answers
What is the licensed user permitted to do with the software program?
What is the licensed user permitted to do with the software program?
Signup and view all the answers
What is softlifting?
What is softlifting?
Signup and view all the answers
What is the primary characteristic of a computer virus?
What is the primary characteristic of a computer virus?
Signup and view all the answers
What is the consequence of client-server overuse?
What is the consequence of client-server overuse?
Signup and view all the answers
What is hard-disk loading?
What is hard-disk loading?
Signup and view all the answers
What is online piracy?
What is online piracy?
Signup and view all the answers
What is counterfeiting?
What is counterfeiting?
Signup and view all the answers
What type of computer virus is notoriously difficult to remove and often requires a full system format?
What type of computer virus is notoriously difficult to remove and often requires a full system format?
Signup and view all the answers
What is the term commonly used to refer to all forms of malicious software?
What is the term commonly used to refer to all forms of malicious software?
Signup and view all the answers
What makes multipartite viruses tough to remove?
What makes multipartite viruses tough to remove?
Signup and view all the answers
What is one of the reasons why people create viruses?
What is one of the reasons why people create viruses?
Signup and view all the answers
What is the estimated annual economic damage caused by computer viruses?
What is the estimated annual economic damage caused by computer viruses?
Signup and view all the answers
What is unique about polymorphic viruses?
What is unique about polymorphic viruses?
Signup and view all the answers
What type of malware is a form of malicious software that demands payment in exchange for restoring access to data?
What type of malware is a form of malicious software that demands payment in exchange for restoring access to data?
Signup and view all the answers
What is the effect of an overwrite virus on a file?
What is the effect of an overwrite virus on a file?
Signup and view all the answers
Why do antivirus firms need to spend days or months creating detection routines for polymorphic viruses?
Why do antivirus firms need to spend days or months creating detection routines for polymorphic viruses?
Signup and view all the answers
What is a result of computer viruses infecting a system?
What is a result of computer viruses infecting a system?
Signup and view all the answers
What is a characteristic of multipartite viruses?
What is a characteristic of multipartite viruses?
Signup and view all the answers
What is the term erroneously used to refer to other types of malware?
What is the term erroneously used to refer to other types of malware?
Signup and view all the answers
What is a response to the threat of computer viruses?
What is a response to the threat of computer viruses?
Signup and view all the answers
What happens if a multipartite virus remains in the boot sector after cleaning a machine's program files?
What happens if a multipartite virus remains in the boot sector after cleaning a machine's program files?
Signup and view all the answers
What makes polymorphic viruses difficult to detect?
What makes polymorphic viruses difficult to detect?
Signup and view all the answers
What is a consequence of deleting a file infected by an overwrite virus?
What is a consequence of deleting a file infected by an overwrite virus?
Signup and view all the answers
What happens when you open an infected document?
What happens when you open an infected document?
Signup and view all the answers
How often should you update your anti-virus software?
How often should you update your anti-virus software?
Signup and view all the answers
What is a good practice when using floppy drives?
What is a good practice when using floppy drives?
Signup and view all the answers
What should you do when receiving unexpected email attachments?
What should you do when receiving unexpected email attachments?
Signup and view all the answers
Why is it important to have multiple backups of important files?
Why is it important to have multiple backups of important files?
Signup and view all the answers
Why is it important to install security updates for your operating system and programs?
Why is it important to install security updates for your operating system and programs?
Signup and view all the answers
Study Notes
Software Piracy
- Software piracy is the illegal copying, distribution, or use of software, causing significant lost revenue for publishers and higher prices for consumers.
- Most software programs are licensed for use by one user or at one computer site, and making copies of the software for anything other than backup purposes is a violation of copyright laws.
- Types of software piracy include:
- Softlifting: borrowing and installing a copy of a software application from a colleague
- Client-server overuse: installing more copies of the software than licensed for
- Hard-disk loading: installing and selling unauthorized copies of software on refurbished or new computers
- Counterfeiting: duplicating and selling copyrighted programs
- Online piracy: downloading illegal software from peer-to-peer networks, Internet auctions, or blogs
Computer Viruses
- A computer virus is a type of malicious software that replicates itself by modifying other computer programs and inserting its own code.
- Infected computer programs can include data files, the "boot" sector of the hard drive, and other areas.
- Computer viruses cause billions of dollars' worth of economic damage each year, due to system failure, wasted computer resources, corrupted data, and increased maintenance costs.
- Motives for creating viruses can include seeking profit, sending a political message, personal amusement, demonstrating vulnerabilities, sabotage, and denial of service.
Types of Viruses
- Boot Sector Virus: infects the master boot record, making it difficult to remove, often requiring a full system format.
- Direct Action Virus: attaches itself to a particular type of file, typically EXE or COM files, and spreads to other similar files in the directory.
- Resident Virus: installs itself on a computer, allowing it to work even when the original source of the infection has been eradicated.
- Multipartite Virus: spreads in multiple ways and takes different actions on an infected computer depending on variables like the operating system installed or the existence of certain files.
- Polymorphic Virus: changes its signature (binary pattern) every time it replicates, making it difficult to detect for anti-virus programs.
- Overwrite Virus: deletes the contents of any file it infects, requiring the file to be deleted to remove the virus.
Actions to Prevent Virus Infection
- Always update your anti-virus software at least weekly.
- Back up your important files and ensure they can be restored.
- Change the computer's boot sequence to always start the PC from its hard drive.
- Don't share Drive C: without a password and without read-only restrictions.
- Empty floppy drives of diskettes before turning on computers, especially laptops.
- Forget opening unexpected e-mail attachments, even if they're from friends.
- Get trained on your computer's anti-virus software and use it.
- Have multiple backups of important files.
- Install security updates for your operating system and programs as soon as possible.
- Jump at the chance to learn more about your computer to help spot viruses.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers the basics of software piracy, its effects on revenue, and licensing rules. Learn about the illegal copying, distribution, and use of software.