Statements (65)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:software
gptkb:malware |
| gptkbp:canBeMetamorphic |
Yes
|
| gptkbp:canBeNonResident |
Yes
|
| gptkbp:canBePolymorphic |
Yes
|
| gptkbp:canBeResident |
Yes
|
| gptkbp:canBeStealth |
Yes
|
| gptkbp:category |
Information security
Cybersecurity threat Computer crime Digital forensics |
| gptkbp:cause |
Unauthorized access
Data loss Performance degradation System corruption |
| gptkbp:defines |
A type of malicious software program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
|
| gptkbp:detects |
Antivirus software
|
| gptkbp:discoveredBy |
1971
|
| gptkbp:encryption |
Yes
|
| gptkbp:firstVirusName |
Creeper
|
| gptkbp:infects |
gptkb:Boot_sector
Documents System files Scripts Application files |
| gptkbp:influencedBy |
Reputation damage
Financial loss Data breach Service disruption |
| gptkbp:notableExample |
gptkb:Michelangelo
gptkb:Melissa gptkb:Conficker gptkb:Stuxnet gptkb:Code_Red gptkb:CryptoLocker ILOVEYOU Mydoom Nimda Sasser |
| gptkbp:payload |
gptkb:malware
Non-destructive Spyware Destructive |
| gptkbp:platform |
gptkb:Windows
gptkb:macOS gptkb:Linux Mobile OS |
| gptkbp:prevention |
Firewalls
Regular software updates Email filtering Safe computing practices |
| gptkbp:relatedTo |
gptkb:Dragon
gptkb:Trojan_Horse Spyware Rootkit Adware |
| gptkbp:removes |
Antivirus software
|
| gptkbp:spreadTo |
Email attachments
Network connections Removable media Infecting executable files |
| gptkbp:writtenBy |
Various programming languages
|
| gptkbp:bfsParent |
gptkb:The_Great_Cave_Offensive
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Computer Virus
|