SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Chapter IV COMPUTER VIRUS Mr. Jesus F. Obenita Jr. BBEMNHS-ICT Teacher
5 DEADLIEST VIRUSES
WHAT IS A COMPUTER VIRUS? ,[object Object],[object Object],[object Object]
WHY DO PEOPLE CREATE COMPUTER VIRUS? ,[object Object],[object Object],[object Object],[object Object],[object Object]
HISTORY ,[object Object],[object Object],[object Object],[object Object],[object Object]
VIRUS MISCHEIF ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROPAGATION TRICK ,[object Object],[object Object]
 
HOW VIRUS SPREADS ,[object Object],[object Object],[object Object]
COMMON ROUTES FOR VIRUS ,[object Object],[object Object],[object Object],[object Object]
HOW INFECTION OCCURS ,[object Object],[object Object]
HOW VIRUS WORKS?
WHAT ARE SOME VIRUS SYMPTOMS? ,[object Object],[object Object],[object Object]
ANTI-VIRUS MEASURES ,[object Object],[object Object],[object Object],[object Object],[object Object]
ANTI VIRUS SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
End of the Lesson Thank you for Listening

Weitere ähnliche Inhalte

Was ist angesagt?

أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
Prof. Othman Alsalloum
 
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
JarellScott
 

Was ist angesagt? (20)

System security
System securitySystem security
System security
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network security
Network securityNetwork security
Network security
 
Data recovery
Data recoveryData recovery
Data recovery
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Computer security and
Computer security andComputer security and
Computer security and
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Computer security
Computer securityComputer security
Computer security
 
Information security principles an understanding
Information security principles an understandingInformation security principles an understanding
Information security principles an understanding
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer security
Computer securityComputer security
Computer security
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
 
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for Journalists
 

Andere mochten auch

Anvita Gita Supersite Case Study Nov2000
Anvita   Gita Supersite Case Study Nov2000Anvita   Gita Supersite Case Study Nov2000
Anvita Gita Supersite Case Study Nov2000
guest6e7a1b1
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
norzaini
 
Unit1 principle of programming language
Unit1 principle of programming languageUnit1 principle of programming language
Unit1 principle of programming language
Vasavi College of Engg
 

Andere mochten auch (20)

Anvita Gita Supersite Case Study Nov2000
Anvita   Gita Supersite Case Study Nov2000Anvita   Gita Supersite Case Study Nov2000
Anvita Gita Supersite Case Study Nov2000
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Software testing - basics
Software testing - basicsSoftware testing - basics
Software testing - basics
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Presentation on java
Presentation  on  javaPresentation  on  java
Presentation on java
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
The different kind of programming language
The  different kind of programming languageThe  different kind of programming language
The different kind of programming language
 
CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
Computer Languages.
Computer Languages.Computer Languages.
Computer Languages.
 
Unit1 principle of programming language
Unit1 principle of programming languageUnit1 principle of programming language
Unit1 principle of programming language
 

Ähnlich wie Chapter iv computer virus

Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
Athena Catindig
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
aschnapper
 

Ähnlich wie Chapter iv computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Computervirus
Computervirus Computervirus
Computervirus
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
Virus
VirusVirus
Virus
 
Slideshow Alisha Schnapper
Slideshow Alisha SchnapperSlideshow Alisha Schnapper
Slideshow Alisha Schnapper
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
virus
virusvirus
virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Mehr von Jesus Obenita Jr.

Session 2 test construction.mt's
Session 2   test construction.mt'sSession 2   test construction.mt's
Session 2 test construction.mt's
Jesus Obenita Jr.
 

Mehr von Jesus Obenita Jr. (20)

Organization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management TheoryOrganization and management 3 a Evolution of Management Theory
Organization and management 3 a Evolution of Management Theory
 
Organization and management 2 Management Function
Organization and management 2 Management FunctionOrganization and management 2 Management Function
Organization and management 2 Management Function
 
Organization and management 1
Organization and management 1Organization and management 1
Organization and management 1
 
Designing web page marquee and img tag
Designing web page  marquee and img tagDesigning web page  marquee and img tag
Designing web page marquee and img tag
 
Ms excel 2013 formatting worksheets
Ms excel 2013 formatting worksheetsMs excel 2013 formatting worksheets
Ms excel 2013 formatting worksheets
 
Ms excel 2013 data management
Ms excel 2013 data managementMs excel 2013 data management
Ms excel 2013 data management
 
Microsoft Excel introduction
Microsoft Excel introductionMicrosoft Excel introduction
Microsoft Excel introduction
 
Word 2013 working with pictures
Word 2013 working with picturesWord 2013 working with pictures
Word 2013 working with pictures
 
Word 2013 Formatting Page
Word 2013 Formatting PageWord 2013 Formatting Page
Word 2013 Formatting Page
 
Word 2013 8
Word 2013 8Word 2013 8
Word 2013 8
 
Ms word 2013 7
Ms word 2013 7Ms word 2013 7
Ms word 2013 7
 
Ms word 2013 6
Ms word 2013 6Ms word 2013 6
Ms word 2013 6
 
Ms word 2013 4
Ms word 2013 4Ms word 2013 4
Ms word 2013 4
 
Ms word 2013 2
Ms word 2013 2Ms word 2013 2
Ms word 2013 2
 
Ms word 2013
Ms word 2013Ms word 2013
Ms word 2013
 
Parts of the ms word 2013 screen and
Parts of the ms word 2013 screen andParts of the ms word 2013 screen and
Parts of the ms word 2013 screen and
 
Word processor
Word processorWord processor
Word processor
 
Session 2 test construction.mt's
Session 2   test construction.mt'sSession 2   test construction.mt's
Session 2 test construction.mt's
 
Cooking ingredients
Cooking ingredientsCooking ingredients
Cooking ingredients
 
Color theory
Color theoryColor theory
Color theory
 

Chapter iv computer virus