Browse Definitions :
Definition

boot sector virus

A boot sector virus is malware that infects the computer storage sector where startup files are found. The boot sector contains all the files required to start the operating system (OS) and other bootable programs. The viruses run at bootup, allowing them to execute malicious code during startup time -- before many security layers are executed, including antivirus software.

There are two types of boot sector viruses. The older types run from the first sector of the storage media that is used to start up the computer. This type was especially common at the time of floppy disks for DOS-based booting. This older type of virus can, at least theoretically, also exist on other media such as CD, DVD ROM, flash drives and other removable storage. More common and recent are viruses that infect the master boot record (MBR). Although they don’t infect the actual boot sector, these viruses still inject themselves into the boot process similarly to those that do, to conceal malicious actions. MBR-infecting viruses don’t require that media is left in the computer at boot time as true boot sector viruses do.

Boot sector viruses are among three classes of viruses: macro viruses, file infectors and system or boot-record infectors. Of the three classes, boot sector viruses can be the most privileged and damaging. Because boot sector viruses affect the location where the computer stores essential start up files, they can make a computer unbootable.

Boot sector viruses and root kits are related types of malware and both can host further infections. Boot sector viruses often don’t have the same level of concealment as root kits but because they run early in startup, they can have all the privilege that modern root kits do. Current operating systems, BIOS and UEFI architectures include protection against boot sector viruses, making them less common than they were in older systems.

This was last updated in January 2017

Continue Reading About boot sector virus

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close