Vulnerabilities_and_infection_vectors Computer_virus




1 vulnerabilities , infection vectors

1.1 software bugs
1.2 social engineering , poor security practices
1.3 vulnerability of different operating systems





vulnerabilities , infection vectors
software bugs

as software designed security features prevent unauthorized use of system resources, many viruses must exploit , manipulate security bugs, security defects in system or application software, spread , infect other computers. software development strategies produce large numbers of bugs produce potential exploitable holes or entrances virus.


social engineering , poor security practices

in order replicate itself, virus must permitted execute code , write memory. reason, many viruses attach executable files may part of legitimate programs (see code injection). if user attempts launch infected program, virus code may executed simultaneously. in operating systems use file extensions determine program associations (such microsoft windows), extensions may hidden user default. makes possible create file of different type appears user. example, executable may created , named picture.png.exe , in user sees picture.png , therefore assumes file digital image , safe, yet when opened, runs executable on client machine.


vulnerability of different operating systems

the vast majority of viruses target systems running microsoft windows. due microsoft s large market share of desktop computer users. diversity of software systems on network limits destructive potential of viruses , malware. open-source operating systems such linux allow users choose variety of desktop environments, packaging tools, etc., means malicious code targeting of these systems affect subset of users. many windows users running same set of applications, enabling viruses rapidly spread among microsoft windows systems targeting same exploits on large numbers of hosts.


while linux , unix in general have natively prevented normal users making changes operating system environment without permission, windows users not prevented making these changes, meaning viruses can gain control of entire system on windows hosts. difference has continued partly due widespread use of administrator accounts in contemporary versions windows xp. in 1997, researchers created , released virus linux—known bliss . bliss, however, requires user run explicitly, , can infect programs user has access modify. unlike windows users, unix users not log in administrator, or root user , except install or configure software; result, if user ran virus, not harm operating system. bliss virus never became widespread, , remains chiefly research curiosity. creator later posted source code usenet, allowing researchers see how worked.








Comments