Computers face various threats from malicious software (malware) and online attacks. Understanding these threats is the first step towards protecting your digital information. In the CBSE Class 7 computer curriculum, students learn to identify and defend against common computer threats including viruses, worms, spyware, and phishing.
A computer virus is a malicious program that attaches itself to a legitimate file or program and spreads when the infected file is shared or executed. Like a biological virus, it replicates by inserting copies of itself into other programs. Viruses can corrupt files, slow down computers, and even erase data. Examples include the ILOVEYOU virus and the Melissa virus.
A computer worm is a standalone malicious program that replicates itself to spread to other computers, typically over a network. Unlike viruses, worms do not need to attach to existing programs. They can spread via email attachments, network shares, or security vulnerabilities. The Mydoom worm and the Conficker worm are well-known examples.
Spyware is software that secretly monitors your computer activity and collects personal information without your consent. It can track your keystrokes (keylogger), browsing habits, passwords, and even credit card numbers. Spyware often comes bundled with free software downloads or through malicious websites.
Phishing is a social engineering attack where criminals send fake emails, messages, or create fake websites that look like legitimate organisations (banks, social media sites) to trick people into revealing personal information like passwords, credit card numbers, or bank details. Always verify the sender and URL before entering personal information.
Malware spreads through: (1) Email attachments and links. (2) Downloading infected software from the internet. (3) Infected USB drives and external devices. (4) Malicious websites and pop-up ads. (5) Peer-to-peer file sharing. (6) Exploiting software vulnerabilities. Being aware of these vectors helps prevent infection.
The most common infection vectors are email attachments, clicking malicious links, downloading software from untrusted sources, and visiting compromised websites.
Viruses typically damage software and data, not physical hardware. However, some malware can overheat components by running intensive operations, or corrupt firmware (like BIOS), which may require hardware replacement.
Signs include: unusually slow performance, frequent crashes, unexpected pop-ups, programs starting or closing automatically, new icons appearing, and unusual network activity.
Book a Trial + Diagnostic session. Get a personalized Learning Path with clear milestones, tutor match, and a plan recommendation — all within 24 hours.
Book Trial + Diagnostic →