Sources of Virus

 

Welcome to Class !!

We are eager to have you join us !!

In today’s Computer Science class, We will be discussing the Sources of Computer Virus. We hope you enjoy the class!

 

computer virus computer science classnotesng

 

 

The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hamper important work involved with data and documents. It is imperative for every computer user to be aware of the software and programs that can help to protect personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks.

The top sources of virus attacks are highlighted below:

  1. Pirated or Cracked Software – Are you aware of software cracking? Well, every time you open a cracked software, your antivirus software might flag it as malware as the cracks consist of malicious scripts. Always say “No” to cracks as they can inject malicious script into your PC.
  2. Downloadable Programs – One of the possible sources of virus attacks is downloadable programs from the web. Unreliable sources and internet newsgroups are one of the main sources of computer virus attacks. Downloadable files are one of the best possible sources of viruses. Any type of executable program including games, freeware, screen savers as well as executable files is one of the major sources of computer virus attacks. Executable files having an extension of “.com”, “.exe” and “coolgame.exe” contain virus sources too. If in the case you want to download programs from the internet then it is necessary to scan every program before downloading them.
  3. Internet – One of the easiest ways to get a virus on your device is through the Internet. Make sure to check URL before accessing any website. For a secured URL always look for ‘https’ in it.
  4. Email Attachments – Email attachments are one of the other popular sources of computer virus attacks. Hence, you must handle email attachments with extreme care, especially if the email comes from an unknown sender. Installation of a good antivirus assumes prime necessity if one desires to eliminate the possibility of virus attacks. It is necessary to scan the email even if it comes from a friend. There exists a possibility that the friend may have unknowingly forwarded virus along with the email attachment.
  5. Removable Storage Devices – Floppies are already out of the league. And, CDs started making their way out as well. Now, the pointer goes to flash drives (often referred to as pen drives or thumb drives) and to external hard disks. You know it is possible to run a program automatically at the time you plug a removable storage device into a PC. The program may be malware. Always scan your removable media soon after you plug it into the computer. Also, don’t forget to turn off the autoplay feature.  Be sure to install any antivirus program to protect yourself from such auto-run.
  6. Malicious Website – It is better to visit a secure website as there are plenty of snares on the internet with loads of malicious codes and programs. Most times we are distracted a lot by popup and popover. Some websites even install adware (with other software) that you keep seeing unnecessary ads right from the moment you turn the network on.

 

EVALUATION                                                                         

  1. Highlight FIVE top sources of a computer virus?

 

 

We have come to the end of this class. We do hope you enjoyed the class?

Should you have any further question, feel free to ask in the comment section below and trust us to respond as soon as possible.

In our next class, we will be talking about Virus Warning Signs. We are very much eager to meet you there.

 

School Owner? Looking for ready-made content and tools to save time and grow easily? Book a free demo session now

Get more class notes, videos, homework help, exam practice on Android [DOWNLOAD]

Get more class notes, videos, homework help, exam practice on iPhone [DOWNLOAD]

Leave a Reply

Your email address will not be published. Required fields are marked *

Don`t copy text!