Difference between revisions of "Computer Viruses"

From OWASP
Jump to: navigation, search
(References)
Line 17: Line 17:
  
 
== References ==
 
== References ==
[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IdgNow.uol.com.br]
+
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IdgNow.uol.com.br]
[http://www.gironsoft.com.br/virus.htm Gironsoft]
+
*[http://www.gironsoft.com.br/virus.htm Gironsoft]
[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]
+
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]
[http://www.infowester.com/virus.php Infowester]
+
*[http://www.infowester.com/virus.php Infowester]
[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]
+
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]

Revision as of 13:09, 14 July 2008

Contents

Description

A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.

Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.

Risk Factors

TBD

Examples

TBD

Related Attacks

TBD

Related Vulnerabilities

TBD

References