Literature

Páginas: 11 (2672 palabras) Publicado: 14 de octubre de 2012
UNIT 18

Data Security 1
STARTER

What stories do you think followed these headlines? Compare answers within your group. 1 2 3 Love bug creates worldwide chaos. Hackers crack Microsoft software codes. Web phone scam.

What other types of computer crime are there? Make a list within your group.

READING

Study this diagram which explains how one type of virus operates. Try to answerthese questions. 1 2 3 What is the function of the Jump instruction? What are the main parts of the virus code? What is the last act of the virus?
UNINFECTED PROGRAM ORIGINAL
starting instruction

INFECTED PROGRAM

JUMP
instruction

MISDIRECTION routine

REPRODUCTION routine

TRIGGER routine

VIRUS CODE

PAYLOAD routine

Fig 1 How a virus infects a program

original startinginstruction, plus code to return control to the program as originally written

Scan this text to check your answers to Task 3. Ignore any parts which do not help you with this task.

THE ANATOMY OF A VIRUS A biological virus is a very small, simple organism that infects living cells, known as the host, by attaching itself to them and using them to reproduce itself. This often causes harm to thehost cells. Similarly, a computer virus is a very small program routine that infects a computer system and uses its resources to reproduce itself. It often does this by patching the operating system to enable it to detect program files, such as COM or EXE files. It then copies itself into those files. This sometimes causes harm to the host computer system. When the user runs an infected program, itis loaded into memory carrying the virus. The virus uses a common programming technique to stay resident in memory. It can then use a reproduction routine to infect other programs. This process continues until the computer is switched off. The virus may also contain a payload that remains dormant until a trigger event activates it, such as the user pressing a particular key. The payload can havea variety of forms. It might do something relatively harmless such as displaying a message on the monitor

screen or it might do something more destructive such as deleting files on the hard disk. When it infects a file, the virus replaces the first instruction in the host program with a command that changes the normal execution sequence. This type of command is known as a JUMP command andcauses the virus instructions to be executed before the host program. The virus then returns control to the host program which then continues with its normal sequence of instructions and is executed in the normal way. To be a virus, a program only needs to have a reproduction routine that enables it to infect other programs. Viruses can, however, have four main parts. A misdirection routine thatenables it to hide itself; a reproduction routine that allows it to copy itself to other programs; a trigger that causes the payload to be activated at a particular time or when a particular event takes place; and a payload that may be a fairly harmless joke or may be very destructive. A program that has a payload but does not have a reproduction routine is known as a Trojan.

Now read the whole textto find the answers to these questions. 1 2 3 4 5 6 Routine 1 2 3 4 misdirection reproduction trigger payload How are computer viruses like biological viruses? What is the effect of a virus patching the operating system? Why are some viruses designed to be loaded into memory? What examples of payload does the writer provide? What kind of programs do viruses often attach to? Match each virusroutine to its function. Function a b c d does the damage attaches a copy of itself to another program hides the presence of the code decides when and how to activate the payload

7 How does a Trojan differ from a virus?

126

UNIT 18 Data Security 1

LANGUAGE WORK What is the relationship between these actions? 1 A date or event occurs. 2 The trigger routine runs. 3 The payload routine...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Literatura
  • La literatura
  • Literatura
  • Literatura
  • Literatura
  • Literatura
  • Literatura
  • Literatura

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS