Statements (65)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:software
malware |
gptkbp:canBeMetamorphic |
Yes
|
gptkbp:canBeNonResident |
Yes
|
gptkbp:canBePolymorphic |
Yes
|
gptkbp:canBeResident |
Yes
|
gptkbp:canBeStealth |
Yes
|
gptkbp:category |
Information security
Cybersecurity threat Computer crime Digital forensics |
gptkbp:cause |
Unauthorized access
Data loss Performance degradation System corruption |
gptkbp:defines |
A type of malicious software program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive.
|
gptkbp:detects |
Antivirus software
|
gptkbp:discoveredBy |
1971
|
gptkbp:encryption |
Yes
|
gptkbp:firstVirusName |
Creeper
|
https://www.w3.org/2000/01/rdf-schema#label |
Computer Virus
|
gptkbp:infects |
Documents
System files Scripts Boot sector Application files |
gptkbp:influencedBy |
Reputation damage
Financial loss Data breach Service disruption |
gptkbp:notableExample |
gptkb:Michelangelo
gptkb:Melissa gptkb:Conficker gptkb:Stuxnet gptkb:Code_Red gptkb:CryptoLocker ILOVEYOU Mydoom Nimda Sasser |
gptkbp:payload |
malware
Non-destructive Spyware Destructive |
gptkbp:platform |
gptkb:Windows
gptkb:macOS gptkb:Linux Mobile OS |
gptkbp:prevention |
Firewalls
Regular software updates Email filtering Safe computing practices |
gptkbp:relatedTo |
gptkb:Dragon
gptkb:Trojan_Horse Spyware Rootkit Adware |
gptkbp:removes |
Antivirus software
|
gptkbp:spreadTo |
Email attachments
Network connections Removable media Infecting executable files |
gptkbp:writtenBy |
Various programming languages
|
gptkbp:bfsParent |
gptkb:The_Great_Cave_Offensive
|
gptkbp:bfsLayer |
8
|