Browse Definitions :
Definition

boot sector virus

Contributor(s): Matthew Haughn

A boot sector virus is malware that infects the computer storage sector where startup files are found. The boot sector contains all the files required to start the operating system (OS) and other bootable programs. The viruses run at bootup, allowing them to execute malicious code during startup time -- before many security layers are executed, including antivirus software.

There are two types of boot sector viruses. The older types run from the first sector of the storage media that is used to start up the computer. This type was especially common at the time of floppy disks for DOS-based booting. This older type of virus can, at least theoretically, also exist on other media such as CD, DVD ROM, flash drives and other removable storage. More common and recent are viruses that infect the master boot record (MBR). Although they don’t infect the actual boot sector, these viruses still inject themselves into the boot process similarly to those that do, to conceal malicious actions. MBR-infecting viruses don’t require that media is left in the computer at boot time as true boot sector viruses do.

Boot sector viruses are among three classes of viruses: macro viruses, file infectors and system or boot-record infectors. Of the three classes, boot sector viruses can be the most privileged and damaging. Because boot sector viruses affect the location where the computer stores essential start up files, they can make a computer unbootable.

Boot sector viruses and root kits are related types of malware and both can host further infections. Boot sector viruses often don’t have the same level of concealment as root kits but because they run early in startup, they can have all the privilege that modern root kits do. Current operating systems, BIOS and UEFI architectures include protection against boot sector viruses, making them less common than they were in older systems.

Udacity explains how boot sector viruses work:

This was last updated in January 2017

Continue Reading About boot sector virus

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close