Free Essay

Virus Technology

In:

Submitted By ekeneibeh2004
Words 5536
Pages 23
VIRUS TECHNOLOGY

view Presentation

The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well.
Definition : A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent.

In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the virus i.e. who created the first virus, for what purpose and hoe it affect to the computer. Then classification of viruses by to different methods:
Ø General classification of the virus.
Ø Behavioral classification of the virus. We covered the topic how nowadays viruses affects to the Mobiles, how they come to the mobile. The small and most important topic that we covered is the ‘Positive Virus’. We covered how the virus actually works in the host computer along with one example as they would enlighten our knowledge about viruses, this is because we want to secure of viruses and actually need to known how are they programmed and executed automatically. We also covered some information about the most popular viruses with some vital information i.e. how they work, how much harmful to the host etc. At last we covered the solution for the virus i.e. Anti-virus. In this topic we covered how to detect the computer virus, how anti-virus works. AN INTRODUCTION TO VIRUSES

In the mid-eighties, so legend has it, the Amjad brothers of Pakistan ran a computer store. Frustrated by computer piracy, they wrote the first computer virus, a boot sector virus called Brain. From those simple beginnings, an entire counter-culture industry of virus creation and distribution emerged, leaving us today with several tens of thousands of viruses.
In just over a decade, most of us have been familiar with the term computer virus. Even those of us who don’t know how to use a computer have heard about viruses through Hollywood films such as Independence Day or Hackers (though Hollywood’s depiction of viruses is usually highly inaccurate). International magazines and newspapers regularly have virus-scares as leading stories. There is no doubt that our culture is fascinated by the potential danger of these viruses.
Many people believe the worst a virus can do is format your hard disk. In fact, this type of payload is now harmless for those of us who back up our important data. Much more destructive viruses are those which subtly corrupt data. Consider, for example, the effects of a virus that randomly changes numbers in spreadsheet applications by plus or minus 10% at a stockbroker. Other nasty viruses post company confidential documents in your own name to some of the atlases Internet newsgroups, an act, which can both, ruin your reputation and the company’s confidentiality.
Despite our awareness of computer viruses, how many of us can define what one is, or how it infects computers? This paper aims to demystify the basics of computer viruses, summarizing what they are, how they attack and what we can do to protect ourselves against them.
DEFINITION:-
“A computer virus is a coded program that is written in Assembly or a System programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent. In addition, a virus is designed to replicate copies of itself in order to spread the infection widely among other uninfected programs and systems.”
A virus is nothing more than a program. A virus is a serious problem for everyone in the information technology industry. Viruses range from the harmless programs displaying a character on your screen to the malicious codes which go on to format your entire hard-disk.
Just like a biological virus that takes over a living cell, a computer virus containing a set of coded instructions, also invades a host system and tries to replicate and infect new hosts. A sophisticated virus can spread undetected for a long time, waiting for a signal to begin destroying or altering data. A signal can be in the form of date, or a change in a system resource data, etc.
The difference between a computer virus and other programs is that viruses are designed to self-replicate (that is to say, make copies of themselves). They usually self-replicate without the knowledge of the user. Viruses often contain ‘payloads’, actions that the virus carries out separately from replication. Payloads can vary from the annoying (for example, the WM97/Class-D virus, which repeatedly displays messages such as “I think ‘username’ is a big stupid jerk”), to the disastrous (for example, the CIH virus, which attempts to overwrite the Flash BIOS, which can cause irreparable damage to certain machines).
Many people believe the worst a virus can do is format your hard disk. In fact, this type of payload is now harmless for those of us who back up our important data. Much more destructive viruses are those which subtly corrupt data.
Viruses can be hidden in programs available on floppy disks or CDs, hidden in email attachments or in material downloaded from the web. If the virus has no obvious payload, a user without anti-virus software may not even be aware that a computer is infected.
A computer that has an active copy of a virus on its machine is considered infected. The way in which a virus becomes active depends on how the virus has been designed, e.g. macro viruses can become active if the user simply opens, closes or saves an infected document.

A BRIEF HISTORY OF VIRUSES

Over the past decades, the computer viruses have evolved through numerous avatars. From being rather 'dumb', they have developed into programs exhibiting surprising 'smart¬ness'. We give you an overview of how viruses have devel¬oped over time.
1950'S-1970:THE PRE-HISTORIC PERIOD
The viruses, as we know them now, actually started out in unpretentious surroundings of research laboratories. In the 1950's, researchers studied, what they called as-'Self-altering Automata' programs. Simple program codes were writ-ten to demonstrate rather limited characteristics. In a way, these programs were the pre-historic (in a manner of speaking) ancestors of the modern virus.
In the 1960's computer scientists at the Bell Laboratories had viruses battling each other in a game called Core Wars. The object of the game was to create a virus small enough to destroy opposing viruses without being caught. Like computers, viruses too were studied keeping in mind their military implications. Of course, several research foundations too worked on the non-military uses of viruses.
1970'S-1980:THE EARLY TIMES
This was the time when the term 'VIRUS' gained recognition by moving from the research labs to the living rooms of common users. Science fiction novels in the early 1970's were replete with several instances of viruses and their resultant effects. In fact, an entire episode of the famous science fiction TV series, Star Trek, was devoted to viruses. Around the same time, researchers at the Xerox Corp. demonstrated a self-replicating code they had developed.
By now, the use of computers had proliferated to include most government and corporate users. These computers were beginning to be connected by networks. Several or-ganizations began working on developing useful viruses which could help in improving productivity.
1980'S-1990:THE MIDDLE AGES
While on the one hand, the exponentially increasing use of computers and their availability proved to be a boon to the common users, on the other hand, the ugly faces of compu¬ter viruses also made their appearances. From the compu¬ter-science labs, viruses fell into the hands of cyberpunks -unprincipled programmers; who obtained sadistic pleasures from ruining computer systems across the globe.
Among the earliest instances of malicious uses of viruses was when Gene Burelon a disgruntled employee of a US securities firm, introduced a virus in the company computer network and managed to destroy nearly 1, 68,000 records of the corporate database. In October 1987, the (c) Brain virus, later to be known as the 'Pakistani' virus, was found to be working its way quietly through the computer systems in¬stalled at the University of Delaware. This was probably the first mass distributed virus of its kind. In 1988, the so-called Internet Virus was responsible for the breakdown of nearly 6000 UNIX based computers connected to the Internet network in the US. Other well known viruses that made their appearances were Cascade, Jerusalem, Dark Avenger, etc. During this decade, viruses were written to attack different operating software platforms such as, DOS, MAC, UNIX, etc.
1990'S-2004:THE CURRENT PICTURE
The early part of the 1990's was witness to development of sophisticated strains of existing viruses. It was more of a matching of wits between the developers of viruses and the developers of anti-virus programs. In addition to plugging the loopholes in existing viruses, a new family of viruses called the Macro Viruses also made their appearance. These viruses affected files created in the popular MS Word and MS Excel programs.
The decade of the 1990's has seen more and more virus developers writing stealth virus codes giving rise to sophis¬ticated viruses such as the Zero Hunt virus, the Michael Angelo virus, etc. In addition, viruses written to invade net¬worked environments have also come into being, in line with the increasing use of communication networks. The Year 2000 problem, in all probability, will generate families of new viruses which will come in the guise of Y2K solution programs.

2005-2015: THE EMERGING SCENARIO
The first decade in the next millennium will see the generation of the 'intelligent viruses' displaying fuzzy logic characteristics. These viruses will be programmed to alter their codes as and when they detect the presence of anti-virus programs. They will not only attack the traditional computer systems and communication networks, but also, software controlled components in cars, trains, air-traffic control systems, defense equipment, etc. The virus developers in all likelihood will include more and more young adolescents and even, children." Viruses will become the new tools of terrorism; giving rise to 'Cyber Terrorists'.
Since Internet will connect the farthest corners of the globe, the time it takes for a virus to proliferate will be greatly reduced. However, on the flip side, special software development tools will be available to common users to automatically develop anti-virus programs to counter most virus threats.

CLASSIFICATION OF VIRUS: -

There are mainly two methods for classification of the viruses. While classifying a particular virus, we have to keep in mind the general, as well as the behavioral aspects of the virus. Most viruses are designed to exhibit a mixture of properties. Hence, a particular virus can be a file virus, a direct action virus, as well as a stealth virus. Or, a virus can be a boot sector virus, a transient virus, as well as a poly¬morphic virus.

FILE VIRUSES
File viruses are designed to enter your system and infect program and data files. Program files are those files which contain coded instructions, necessary to run or execute software programs. These program files are generally ap¬pended by .COM or .EXE file extensions. However, some file viruses can also infect other executable files, having file extensions such as, .SYS, .OVL, .PRG, .MNU, etc. The program files, most prone to file virus attacks include oper¬ating software, spreadsheets, word processors, games and utilities program files. The data files, susceptible to virus attacks are those that have been created using popular programs, such as, MS-Word, MS-Excel, etc. Usually, such files are attacked by Macro virus A file virus, ordinarily enters the system when you copy data or start your system using an infected floppy disk or, download an infected file from a networked system or, use infected software obtained from unauthorized sources. Once in your system, depending upon the virus code, the virus can either infect other program or data files straightway or, it can choose to hide itself in the system memory (RAM) for the time being. Then, at an appropriate time or if certain system conditions are met, it begins to infect other executed program or data files. The virus infects a program or a data file by replacing part of the original file code with a new code. This new code is designed to pass the actual control of the file to the virus. The virus normally attaches itself to the end of the host file. On execution of an infected file by the user, the virus makes sure that the file is executed properly; to avoid sus¬picion. However, it uses this opportunity to infect other files. At the same time, the virus keeps tabs on the various system resources, so that at an appropriate time (depending upon the virus code), it can unleash its destructive activities. It is interesting to note that most viruses do not infect an already infected file. This is to prevent the file from becoming too large. Because then, the system would be compelled to display the message 'Not enough memory,' thus alerting the user to the possibility of a virus attack. Examples of file viruses are Vienna, Jerusalem, Concept Word Macro virus, etc., BOOT SECTOR VIRUSES A boot sector virus attacks the boot sectors of floppy disks and the master boot records (boot sectors and partition tables) of hard disks. Hence, the boot sector viruses can be sub-divided into the following categories: • Floppy Disk Boot Sector Viruses: As the name suggests, these viruses infect the floppy disk boot sectors only.

• Hard Disk MBR Viruses :
These viruses infect the master boot records, that is, the partition tables of the hard disks. These viruses are also designed to infect the boot sectors of the floppy disks.
A boot sector virus, like other viruses, enters the system when you copy data or start your system using an infected floppy disk or, download an infected file from a networked system or, use infected software obtained from unauthor¬ized sources.
A boot sector virus typically replaces the boot sector (on the first track of the disk) with a part of itself. It then hides the rest of the virus code, along with the real boot sector, on a different area of the disk. In order to avoid detection, this area is marked as a bad sector by the virus. A boot sector virus can also hide itself in the system area of the disk.
From now onwards, whenever the system is turned on (that is, booted), the virus is also loaded in the system memory (RAM). The virus ensures that the real boot sector starts the machine normally. After the startup, the virus takes over and monitors and controls the critical system resources.
On completion of a certain time period or after certain system conditions are met, the virus carries out its designed activities. These activities may range from merely displaying a harmless message on the screen, to irreversibly crashing your hard disk.
This type of virus spreads its infection widely by infecting the boot sectors of other floppy disks inserted in the infected machine. Most boot sector viruses do not infect an already infected disk.
These viruses can be very complex in character and are capable of seriously jeopardizing the working of the infected systems. Some of the examples of Boot Sector viruses include Brain, Stone, Empire, Michelangelo, etc.
DIRECTORY VIRUSES
These viruses are also called as Cluster Viruses and are programmed to modify the directory table entries in an infected system.
A directory virus, like other viruses, enters the system when you copy data or start your system using an infected floppy disk or, download an infected file from a networked system or, use infected software, obtained from unauthor¬ized sources.
The virus, on entering your system, resides in the last cluster of the hard disk. Also, it modifies the starting cluster addresses of all the executable files, by inserting references to the virus address in the File Allocation Table (FAT).
The files themselves are not infected, only their starting cluster addresses are altered, so that every time the file is executed, the virus also becomes active and loads into the system memory. The virus allows the actual program to proceed unhindered (for the time being) in order to avoid detection. Also, the virus, when loaded in memory, contin¬ues to show the original starting cluster address of the file, so as to confuse the user. Like other viruses, this type of a virus also disrupts the smooth working of your system.
These viruses are very intelligent and spread faster than other classes of viruses. Examples of these viruses are DIR II, DIR III, DIR BYWAY, etc.
HOAXES
Psychologists the world over attributes the proliferation of viruses to the constant human desire for recognition and admiration from fellow beings. While some virus developers are smart enough to write and develop innovative viruses (of course, if they could use their ingenuity for more construc¬tive work, the world would be a better place to live in), there are others who would not like to waste time on such work. They would rather gain notoriety in more resourceful ways such as, simply claiming to have developed a virus; without actually having done so.
While visiting a BBS or surfing the Internet, one often comes across information announcing the discovery of a new virus. It is in your interest to take such information with more than a pinch of salt. Please do not take this to mean that you have to lower your guard against suspected viruses. Only, you must make it a point to substantiate the veracity of the information before taking any action.
Should you come across a suspected hoax regarding a virus, keep in mind the following checklist while going through the information:
• Before accepting a statement, find out more about its source. Look for references that can be cross-checked for authenticity.
• Most hoaxes, while deliberately posted, die quick deaths because of their outrageous contents. Try to separate the chaff (junk) from the grain (contents). Look for technical details that can be rationalized.
• Cross-check the technical details with a known expert in the subject.
• Keep track of who else might have received the same information as you. Get in contact with them to elicit their response to the information.
• Look for the location of posting of the 'information. Should the posting be in an inappropriate newsgroup, be suspi¬cious.
• Look at the name of the person posting the information. Is it someone who is clearly identifiable and is an expert in the field?
• Double check the information with other independent sources such as, other sites, other BBSs, etc,
To give you an idea what a hoax looks like, listed below are some of the more notorious hoaxes that have been floating around in cyberspace.
Good Times Virus: The information about this virus when reported, sounded like a sincere warning; issued by naive though, caring users. This virus was supposed to wipe out the data on the system hard disk. Some variations of this theme were the Deeyendra Virus Alert and the Pen Pal Virus Alert- also found to be hoaxes.
Irina Virus:
This was a marketing ploy employed by the UK publishing giant, Penguin Books, to generate reader interest in the latest release of one of their books. Despite a subsequent correction, the virus seemed to have caught the fancy of quite a few computer users.
The Porno GIF Virus:
This virus was purported to be hidden in a pornographic .GIF graphics file and contained indecipherable text in it. Since such contents are indicative of a virus or a Trojan program, this hoax was also believed by many to be true.

MACRO VIRUSES
A macro is an instruction that carries out program commands automatically. Many common applications (e.g. word processing, spreadsheet, and slide presentation applications) make use of macros. Macro viruses are macros that self-replicate. If a user accesses a document containing a viral macro and unwittingly executes this macro virus, it can then copy itself into that application’s startup files. The computer is now infected— a copy of the macro virus resides on the machine.
Any document on that machine that uses the same application can then become infected. If the infected computer is on a network, the infection is likely to spread rapidly to other machines on the network. Moreover, if a copy of an infected file is passed to anyone else (for example, by email or floppy disk), the virus can spread to the recipient’s computer. This process of infection will end only when the virus is noticed and all viral macros are eradicated.
Macro viruses are the most common type of viruses. Many popular modern applications allow macros. Macro viruses can be written with very little specialist knowledge, and these viruses can spread to any platform on which the application is running. However, the main reason for their ‘success’ is that documents are exchanged far more frequently than executables or disks, a direct result of email’s popularity and web use.
TROJAN HORSE
A Trojan horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he or she knew about it. According to some people, a virus is a particular case of a Trojan horse, namely one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program.
PARASITIC VIRUSES
Parasitic viruses attach themselves to programs, also known as executables. When a user launches a program that has a parasitic virus, the virus is surreptitiously launched first. To cloak its presence from the user, the virus then triggers the original program to open. The parasitic virus, because the operating system understands it to be part of the program, is given the same rights as the program to which the virus is attached. These rights allow the virus to replicate, install itself into memory, or release its payload. In the absence of anti-virus software, only the payload might raise the normal user’s suspicions. A famous parasitic virus called Jerusalem has a payload of slowing down the system and eventually deleting every program the user launches.

BEHAVIORAL CLASSIFICATION OF VIRUSES
In addition to the general classification, viruses can also be classified according to the following behavior patterns exhibited by them:
• Nature of attack
• Deception techniques employed
• Frequency of infection
The chart in Figure Chapter 2-3 gives an overview of the behavioral classification of viruses.
NATURE OF ATTACK
Depending upon the way a virus attacks the various files, it can be classified as follows:
Direct Action Virus
A Direct Action virus is one that infects one or more program files; every time an infected file is run or executed. An example of such a virus is the Vienna virus.
Resident Virus
A Resident virus is one which hides itself in the system memory the first time a file, infected with this virus, is executed. After a programmed time period or when certain system conditions are met, the virus becomes active and begins to infect other programs and files. An example of such a virus is the Jerusalem virus.
DECEPTION TECHNIQUES EMPLOYED
Depending upon the way a virus employs the various deception techniques to avoid detection, it can be classified as follows:
Stealth Virus
A Stealth virus is one which hides the modifications made by it to an infected file or a boot sector. This it does by monitoring the disk input/output requests made by other programs. Should a particular program demand to view the infected areas or files on the disk, the virus ensures that the program reads the original uninfected areas; stored else-where on the disk by it. Hence, the virus manages to remain undetected for as long as possible. The Brain virus is an 'example of a Stealth virus.
Polymorphic Virus
A Polymorphic virus is one which produces multiple, but varied copies of itself; in the hope that the virus scanner will not be able to detect all its mutations. This type of virus carries out the infection while changing its code by using a variety of encryption (encoding) techniques. Since a virus scanner would also require a variety of decryption (decod¬ing) codes in order to decipher the various forms of the virus, the scanning process becomes cumbersome, difficult and unreliable. The Dark Avenger virus is an example of this type of virus
Armored Virus
This virus is one which uses special techniques to avoid its tracing and detection. An anti-virus program has to take into account the virus code in order to be effective. An Armored virus is written using a variety of methods so that disassembling of its code becomes extremely difficult. How¬ever, this also makes the virus size much larger. The Whale virus is an example of such a virus.
Companion Virus
A Companion virus is one, which instead of modifying an existing .EXE executable file, creates a new infected copy of the same file, having the same name; but, with a .COM file extension. Hence, whenever the user executes the program file by typing the name of the program at the DOS prompt, the COMMAND.COM file (the Command Interpreter) loads the infected copy of the file. This happens because the .COM files get precedence over the .EXE files. Since in this case, the original file remains unchanged, the virus scanner checking for modifications in the existing files, would fail to notice the virus.
Multipartite/Boot-and-File Virus
This type of virus infects the boot sector as well as the program files. Such viruses usually exhibit dual characteris¬tics. For example, a file virus of this category can also infect the system boot sector and vice-versa. Hence, such a virus becomes difficult to identify. The Tequila virus is an example of such a virus.
Batch File Virus
This type of virus is embedded into an especially written batch file. The batch file in the guise of carrying out a set of instructions in a particular sequence, actually uses the op¬portunity to copy the virus code to other batch files. Fortu¬nately, such viruses are not common.
Cavity Virus
Some program files have empty spaces inside them, for a variety of reasons. A Cavity virus uses this empty space to install itself inside the file, without in anyway altering the program itself.
Since the length of the program is not increased, the virus does not need to employ complex deception techniques. However such viruses are rare. The Lehigh virus is an example of such a virus.
Camouflage Virus
This type of virus is masked to look like a harmless virus-like code; a code that an anti-virus software is likely to ignore. Most anti-virus scanners have a built-in database of virus code data strings. Hence, while scanning a system, there is always a distinct possibility of a false alarm being raised by the scanner. This is particularly so when a system has more than one type of scanner installed in it.
Thus, in order to avoid panic reactions by users, most signature based virus scanners are designed to ignore virus codes that meet certain predetermined conditions. A Cam¬ouflage virus uses this chink in the anti-virus program's Armour to fool it by disguising itself as a harmless virus-like code and thus, escaping detection. Fortunately, most mod¬ern scanners check and cross-check a set of parameters before declaring a file to be virus free. Hence, it is difficult to hide such a virus; with the result that these viruses are not widely found.
Tunneling Virus
An anti-virus interception program keeps track of the system resources in order to detect the presence of a virus. It monitors the interrupt calls made by the various devices. A tunneling virus pre-empts this process by gaining direct access to the DOS and BIOS interrupt handlers. This it does by installing itself under the interception program. Some anti-virus scanners are able to detect such an action and may attempt to reinstall themselves under the virus. This results in interrupt wars between the virus and the anti-virus program, thus resulting in a hung system.

FREQUENCY OF INFECTION
A virus is programmed to propagate copies of itself by spreading the infection to other files within the system. A virus can also be classified according to the frequency with which it spreads the infection.
Fast Infector Virus
This type of virus is one which when active in system memory, not only infects the executed program files, but also, all files that are merely opened. With such a virus in 1 memory, should a scanner be in operation, it would result in all the files getting infected within a short period of time.
Slow Infector Virus
This type of virus, when in system memory, infects only those files which are created or opened. Hence, the user is fooled into thinking that the changes in the file size, as reported by the virus scanner, are due to legitimate reasons.
Sparse Infector Virus
This type of virus is designed to infect other files, only occasionally. For example, the virus may infect every 10th executed file, or only those files having specific lengths, etc. By infecting less often, such viruses minimize the possibility of being discovered.
STAGES IN THE LIFE CYCLE OF A VIRUS
The entire life cycle of a virus can be divided into the following stages.
CREATION
In this stage, a systems programmer creates the virus by writing its program code; using either Assembly language or a systems programming language such as 'C'. Usually, Assembly language code is the preferred choice of most virus programmers.
Various software-writing tools, available off-the-shelf or on various BBSs and Internet sites, can be used to write the virus code. The entire exercise can take anywhere from a few days to a couple of weeks to complete.
GESTATION
This refers to the stage wherein the virus developer secretly introduces the Virus into the outside world. This is done in a variety of ways. One way is to bundle the virus with a useful software utility or a games program and offer it to unsuspecting users. Another way involves introducing the virus through a network such as a public BBS, a company LAN or the Internet.
PROPAGATION
Viruses are designed to replicate copies of themselves and spread the infection exponentially, For example, one infected system infects two other systems, which in turn infect four systems and so on. Before you know it, an entire chain of infections is in progress.
In this stage, an infected system spreads the infection to other systems through the use of infected floppy disks and also by transferring infected files over a network. A network is the fastest way of spreading a virus. A 'good' virus design provides a virus with enough time to spread the infection widely, before being activated.
ACTIVATION
This is the stage where a virus becomes active and proceeds to carry out the designed activity. When and how a virus becomes active, depends on the 'trigger' mechanism of the virus. This 'trigger' may be in the form of a particular date (for example, on the 12th of June - the Independence Day of the Philippines) or, when certain system conditions are met (for example, after opening the 10th file).
The effects of the virus activity may range from simply displaying a harmless message on the screen, to completely formatting the hard disk and thus erasing all data on it. Some viruses, while not causing any outward damage, may use up scarce system resources such as RAM; thus slowing down the computer.
DISCOVERY
This is when a user notices the virus and successfully isolates it. When a virus has managed to propagate widely and infect a number of other systems, there may be several users, who individually or collectively, discover the presence of the virus. Usually, this stage is reached after the Activation stage. However, there have been cases where enterprising users have detected a virus even before it has had the time to activate itself.
As a rule of thumb, a virus is usually discovered at least a year before it has had the opportunity of becoming a major threat.
ASSIMILATION
After a virus is discovered and the information about it publicized, developers of anti-virus software analyze the virus code and develop vaccines for its detection and eradication. At times, even individual users may be able to devise vaccines for the virus.

Similar Documents

Free Essay

Age of Viruses

...The Zika virus was discovered in 1947 and was named after the Zika forest in Uganda. The first case of this virus was detected in 1952. Fourteen cases of the virus have been documented before 2007and there were probably more cases that were unreported. Symptoms of Zika virus are the same as flu and as the result of the similarities some cases might not have been reported. The World Health Organization (WHO), stated the Zika virus is a public health emergency for international concern. The Zika virus will receive funding for $100,000. The reason I chose this virus to study is because it causes birth defects in children. These defects include: microcephaly, (which causes smaller heads in new borns), absent, or not fully developed brain, eye defects, hearing problems, and stunted growth. The virus is usually transmitted by a mosquito and recently it has been proven that it can be transmitted by sexual contact. The signs and symptoms of this virus are usually mild and a person may not know they are sick. Common symptoms are fever, rash, joint pain or conjunctivitis. It has been proven that we build immunities to this virus and if a woman had the vaccine before getting sick with this virus she would not have to worry about the defects that are caused. There is a relatively new approach to combatting Zika virus that is being used to look at cellular structures. It is called Cellular Analysis and Notification of Antigen Risks and Yields...

Words: 316 - Pages: 2

Premium Essay

Influenza Virus Research Paper

...Classification Influenza virus are credited as major respiratory pathogens. Influenza viruses belong to the family Orthomyxoviridae which consists of five genera: Influenza virus A, Influenza virus B, Influenza virus c, Thogotovirus, and Isavirus. Annual epidemics are usually caused by influenza A and B viruses, however generally influenza A has asymptomatic infections even .The general classifications of influenza A include 16 HA subtype (H1-16) and nine NA subtypes (N1-9) the classification is generally done based on haemagglutinin (HA) and neuraminidase (NA) proteins which are responsible for the antigenic properties of the virus The circulation of influenza A subtypes such as H1N1, H3N2, H2N2, and H1N2 have been observed in the past century...

Words: 1453 - Pages: 6

Premium Essay

Arguments Against Crowdsourcing

...Introduction People argue that Information Technology tools and techniques, in the form of crowdsourcing, is what will stop the next virus outbreak from spreading globally, not biology. Indeed, crowdsourcing provides mutual benefits to the countries that experience pandemic diseases and the world as it helps to combat the diseases and limit its spread. However, I disagree that crowdsourcing alone can stop the next virus outbreak due to three reasons. First, globalization improved the transportation resulting in lowering the barrier to spread disease as people travel while carrying diseases. Second, crowdsourcing requires not only platform but also secure connection. Lastly, physician that are participating in crowdsourcing platform might result in errors and...

Words: 1138 - Pages: 5

Premium Essay

Micro

...infectious agent causing tobacco mosaic disease. In 1935, Wendell Stanley isolated tobacco mosaic virus, making it possible to carry out chemical and structural studies on a purified virus. Viroids are infectious pieces of RNA that cause some place diases such a potato spindle tuber disease. In 1980s Prions were first discovered as infectious proteins. Prions are pathogens that are proteins, and they appear to cause a number of degenerative brain diseases, such as Scrapiein sheep, mad cow disease, and Creutzfeldt-Jakob disease in humans. 2. How do viruses, viroids, prions, and bacteria differ in terms of their biological identity and method of infection? Viruses contain both nucleic acids such as DNA or RNA and a protein coat. Viruses cause infection by inserting their genetic material in a host cell. The host cell then reproduces and reads the genetic material, making new viruses that eventually burst out of the cell and leave to infect more. The reason viruses cause disease is that the infected cells can’t carry out the normal functions necessary. Viroids on the other hand have no protein coat, but are only the nucleic acid RNA. Since they have no protein coat and are only the nucleic acid RNA they are often carried around inside viruses. Viroids are naked RNA molecules that infect plants and disrupt their growth. An example of a viroid that is carried in the capsid of the Hepatitis B virus is Hepatitis D. Prions are only proteins without the nucleic acid. Prions generally have...

Words: 1177 - Pages: 5

Free Essay

Small Pox in the Us

...Current Event Article In the article titled “Costly drug for smallpox questioned” published in the Los Angeles Times on November 13, 2011 the antiviral vaccine for smallpox was looked at. This vaccine was developed by Siga Technologies Inc. as a treatment for people who are diagnosed with smallpox too late to use the current vaccine that the government has stockpiled in case of a bioterrorism attack. The drug is controversial as it is not known if it will work in humans due to testing only being allowed in animals. As there are no current smallpox outbreaks to test on, animals are the only test subjects at this time. Also it comes with a large price tag, around $255.00 a dose, this for 1.7 million doses per the contract to be stockpiled. This high price tag and the governments’ apparent favoritism to Siga has caused outrage by some. The disease which causes pustules and a 30% death rate was eradicated worldwide in 1978. The only strains known to exist are in Russian and US freezers. To date there is no credible evidence that any terrorist group or county has the virus and can attack the US with it. However, the government feels that it is important to have not only our current vaccine stockpile, enough to vaccinate the entire US population, but a backup for those not vaccinated or diagnosed in time. The new drug, ST-246, is said to have $115 million in federal support, not including the contract for manufacture and development, which is estimated to be around $433 million. One...

Words: 1085 - Pages: 5

Premium Essay

Management

...were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. “That’s the reality of their daily work life. At the company’s response lab in Santa Monica, California, described as the “dirtiest of all our networks at Symantec. “ Software analysts collect viruses and other suspicious cod and try to figure out how they work so the company can provide security updates to its customers. There’s even a hazardous materials box by the door to the lab, marked DANGER, where they put all the discs, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situations may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well. Vincent Weafer, a native of Ireland, has been the leader of Symantec’s virus hunting team since 1999. Back then, he said “there were less than two dozen people, and . . . nothing really happened. We’d see may be five new viruses a day, and they would spread in a matter of months, not minutes. “Now, Symantec’s virus hunter around the words deals with some 20,000 virus samples each month, not all of which are unique, stand-alone viruses....

Words: 1368 - Pages: 6

Free Essay

Epidemology-Mononelucosis

...Epidemiology is a science that uses quantitative, scientific, and research methods to study the causes of disease, how it is transmitted and preventive measures that can be taken to stop the transmission. Healthcare officials then use the information to help guide the public to optimal health. This paper will take a look at the disease Infectious Mononucleosis and how the community nurse can help fight against it and other infectious diseases. Mononucleosis, also known as the “kissing disease”, is an infectious disease that is mainly found in young adult college students or teen-agers from ages 15-17. Older adults can also get it but it is usually not found in them unless they are immunocompromised. According to the CDC, Epstein-Barr virus (EBV) is the most common cause of infectious mononucleosis, but other viruses can also cause this disease. (CDC, 2014) It is transmitted through the infected person’s salvia, mucous from the nose and throat and sometimes tears, close contact, and sharing drinks and utensils can spread the disease. Mononucleosis can have an incubation period anywhere from 33-49 days, and then symptoms appear around 4-6 weeks. It usually begins slowly with fatigue, a general ill feeling and sore throat. Other symptoms include swollen lymph nodes, fever, muscle aches, and loss of appetite, and possibly a swollen spleen. The treatment for Mononucleosis is usually plenty of rest and plenty of fluids, although in severe cases the doctor may use steroids to reduce...

Words: 1268 - Pages: 6

Premium Essay

Cystic Fibrosis Research Paper

...Normal secretions from these cells are thin and slick but the abnormal sections caused by this gene are thick and sticky and therefore reverse its lubricant function so that instead it plugs up tubes, ducts and passageways, especially in the lungs and pancreas.With the highly advanced technology that we have our hands on we can now diagnose Cystic Fibrosis can be diagnosed within the first month of life which is carried out by the process called screening. Cystic Fibrosis signs and symptoms depend on the extent to which the individual has the disease; even in the same person with the disease the symptoms can improve or worsen as time goes by. Many people with Cystic Fibrosis only realize that they have the disease at around adolescence or adulthood, as they don’t experience any symptoms. It can be determined in childhood and even adulthood which can be detected when one kisses another they can pick up the extremely salty taste of their skin/lips. Many of the other signs of the disease are present in and affect the respiratory...

Words: 1901 - Pages: 8

Free Essay

IntroduccióN a La Bioingeniería

...* * Introducción a la Bioingeniería * * Grupo 1 * 5 de octubre del 2011 Segundo Trabajo Parcial Bioprocesos La tecnología moderna de los bioprocesos es una extensión de las antiguas técnicas que se utilizaban para desarrollar productos útiles al sacar provecho de las actividades biológicas naturales. Pero, ¿al decir “tecnología” y “moderna” significa que esto es algo reciente?. En realidad no, cuando nuestros ancestros hacían bebidas alcohólicas, usaban un bioproceso, al combinar células de levadura con granos de cereal (Brown). Desde hace 8000 años los sumerios en Mesopotamia fabricaban la cerveza dándoles una bebida nutritiva, embriagadora y duradera. Para esto, humedecían la cebada y la germinaban. A partir de estos cereales germinados, o malta, elaboraron el pan de cerveza el cual lo trituraban y lo mezclaban con agua y con la ayuda de un colador trenzado de mimbre separaban el líquido del residuo, que dejaban reposar en barriles cerrados. Era entonces cuando el líquido empezaba a fermentar y de ese jugo dulce nació la cerveza (Renneberg). De igual manera los antiguos egipcios, chinos, japoneses, celtas, germánicos y las culturas prehispánicas de Mesoamrica; elaboraron productos provenientes de la biotecnología tradicional. En este sistema de fermentación, en el que los organismos consumían los granos para crecer, se generan bi-productos, por ejemplo: el dióxido de carbono para el pan de levadura, el etanol para la elaboración del vino...

Words: 3538 - Pages: 15

Premium Essay

Microbiologist

...Anna Anderson PTLW CSUEB July 2011 Activity 1.1.2 MICROBIOLOGIST * Microbiologist Microbiologists study microscopic bacteria, fungi, protists, and viruses. Many of these organisms cause disease (pathogens) and many can provide useful products such as penicillin (antibiotic). * Education and/or Training Required In order to work in this field you must have at least an undergraduate degree in microbiology. Further training with a Masters or Doctorate would be required to do anything other than entry level positions. Excellent microscopy skills and training in aseptic techniques are a must. * Responsibilities and Daily Activities This job requires a strong academic background with a lot of math, chemistry, and biology. Computer and lab skills are essential. Microbiologists grow cultures of bacteria (and other organisms) in medium for study. Using aseptic technique, they grow cultures to measure and calculate the rate of growth and how it grows. They learn what can and cannot kill their organisms and if it is a pathogen, they study ways to stop or slow its growth. In the lab, they work with microscopes, grow cultures, measure the rate of growth, and perform experiments with these organisms. Lab safety is very important in their work. They would NEVER eat or drink in the lab because this could cause contamination or could infect the food they are eating. * Salary Range Microbiologists can work in the academic community, industry or government...

Words: 389 - Pages: 2

Free Essay

Chlamydia

...Chlamydia Chlamydia is one of the most common diseases in the United States. The infection is part of a 'silent epidemic' as most cases do not show symptoms and are left untreated. It can cause pelvic inflammatory disease and lead to scarring of the Fallopian tubes causing infertility and higher risk of ectopic pregnancy. The research was carried out at the Molecular Microbiology Group, at the University of Southampton, in conjunction with the Department of Virology, at the Ben Gurion University of the Negev, in Israel. Professor Ian Clarke, from the University of Southampton, says: "This is a very significant advance in the study of chlamydia and we are proud to be the first people to achieve this. "Previously people have been unable to study chlamydial genetics and this has created a barrier to the comprehensive study of this disease. "We, together with our colleagues in Israel, discovered that by treating the chlamydia with calcium ions we were able to introduce a piece of foreign DNA. "This will open up the field of chlamydia research and will enable a better understanding of chlamydial genetics. It could lead to the development of new approaches to chlamydial vaccines and therapeutic interventions." To prove that they had accessed the chlamydial genome, the research team inserted the gene for a fluorescent protein into C. trachomatis which identified the chlamydial-infected cells by making them glow green. Their paper detailing the breakthrough in the study of chlamydia...

Words: 267 - Pages: 2

Premium Essay

Das Monster

...30333, USA. The American Journal of Tropical Medicine and Hygiene [1997, 57(5):519-525] Type: Journal Article Abstract Highlight Terms Gene Ontology(1) Diseases(1) Species(7) A multi-faceted investigation was conducted in the United Arab Emirates to characterize the epidemiologic and ecologic factors underlying an outbreak of Crimean-Congo hemorrhagic fever (CCHF) noted in November 1994 among abattoir workers. A chart review was conducted among hospitalized suspected cases of viral hemorrhagic fever with onset between January 1994 and March 1995 coupled with serologic testing of available specimens for the presence of virus antigen and IgG and IgM antibodies by ELISA. Livestock handlers and animal skin processors were interviewed and tested for the presence of IgG antibody. Sera from imported and domestic ruminants were examined for antibody for CCHF virus, and ticks collected from these animals were tested with an antigen-capture ELISA. Thirty-five...

Words: 466 - Pages: 2

Free Essay

Micropara

...(350 × 270 nm) containing a double-stranded DNA genome with a size of approximately 200 kb, the ends of which are connected by covalent links  - the different OPV species cannot be distinguished by means of electron microscopy  - OPV are closely related to each other with regard to antigens and show marked homology at the genome level - The genome of the poxviruses encodes for 150–200 different genes - Unlike other DNA viruses, poxviruses replicate in the cytoplasm of infected cells in so-called virus factories (Guarnieri inclusion bodies) - Originally, four different infectious virus particles were distinguished during OPV replication: intracellular mature enveloped virus particles, intracellular enveloped virus particles, cell-associated enveloped virus particles, and extracellular enveloped virus particles. Both intracellular and extracellular viruses play an important part for pathogenesis.  - Intracellular and cell-associated viruses are involved in the spreading of the virus from cell to cell, whereas viruses released from the cell enable the dissemination within the infected organism. QUESTION 1: Which of the following can be administered to an individual infected with orthopoxvirus? a. Human Papillomavirus Quadrivalent (Types 6, 11, 16, 18) Vaccine, Recombinant b. Zoster Vaccine, Live, (Oka/Merck) c. Vaccinia Immune Globulin Intravenous (Human) d. Anthrax Vaccine Adsorbed ANSWER: C The only product currently available for treatment of complications of orthopox...

Words: 777 - Pages: 4

Free Essay

Research Writing

...ENG/102- Research Writing 3-30-2014 Sarah Ghoshal The Reality of AIDS The reality of the AIDS virus comes with bias opinions, fallacies and stereotypes of all kinds. To understand and know the truth about this virus, is to acknowledge facts and become educated. The speech "A Whisper of AIDS" by Mary Fisher addressed arguments and presented the growing concern of ignoring the severity of the disease. The speech by Mary Fisher addressed bias opinions and fallacies. As stated by Mary Fisher, "Because I was not gay, I was not at risk. Because I did not inject drugs, I was not at risk." (American Rhetoric, 2001). These fallacies and biased opinions were based on what people heard or believed, not what they knew. Mary Fisher also addressed the argument of AIDS to be recognized as a virus and not a political creature (American Rhetoric, 2001). Fisher's counter argument said, "Worldwide, forty million, sixty million, or a hundred million infections will be counted in the coming few years." (American Rhetoric, 2001). Her statements showed how ignorant society had been. People believing that they could not get infected, if they were not a drug user or not gay. The effects of her speech were global. As her speech was being broadcasted over numerous networks, 27 million people listened (Shaw, 2012). As stated by Normal Mailer, who was a guy covering the convention, "When Mary Fisher spoke like an angel that night, the floor was in tears, and conceivably the nation as well" (Shaw...

Words: 419 - Pages: 2

Free Essay

Anatomy

...Prevención Primaria Prevención Primaria Educación de la higiene, en el uso de protección en relaciones sexuales, y educación en las formas de transmisión del virus en orden de evitarlas lo más posible. Educación de la higiene, en el uso de protección en relaciones sexuales, y educación en las formas de transmisión del virus en orden de evitarlas lo más posible. Buena higiene, protección y evasión de contacto directo con agujas y/o con fluidos corporales sobre todo si se hay sospecha de infección. Vacuna contra VHB. Visita a tu médico. Buena higiene, protección y evasión de contacto directo con agujas y/o con fluidos corporales sobre todo si se hay sospecha de infección. Vacuna contra VHB. Visita a tu médico. Prevención Terciaria Prevención Terciaria Reposo, aislamiento, esterilización de utensilios y tratamiento sintomático. Reposo, aislamiento, esterilización de utensilios y tratamiento sintomático. Ejercitarse cuando el paciente se sienta capaz. Medidas dietético-higiénicas. Ejercitarse cuando el paciente se sienta capaz. Medidas dietético-higiénicas. AGENTE AGENTE DiagnosticoTemprano y Tratamientos DiagnosticoTemprano y Tratamientos Examen Físico , palpación para valorar hepatomegalia, revisión de mucosas ictericia ocular e interrogatorio clínico sobre coluria y acolia. Examen sanguíneo en busca de bilirrubinas. Tratamiento sintomático. Examen Físico , palpación para valorar hepatomegalia, revisión de mucosas ictericia ocular e interrogatorio clínico sobre...

Words: 845 - Pages: 4