This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Computer Viruses"

From OWASP
Jump to: navigation, search
(Description)
Line 3: Line 3:
  
 
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.
 
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.
 +
 +
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.
  
 
== Risk Factors ==
 
== Risk Factors ==

Revision as of 18:29, 14 July 2008

Description

A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.

Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.

The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.

Risk Factors

TBD

Examples

TBD

Related Attacks

TBD

Related Vulnerabilities

TBD

References