SlideShare ist ein Scribd-Unternehmen logo
1 von 12
ANTI VIRUS
Presented To:
PIR AMAD ALI SHAH
PRESENTED BY
 FURQAN UMER KHAN B-18261
 M. SOHAIB AFZAAL B-17545
Content
 INTRODUCTION
 HISTORY
 ANTIVIRUS TYPES
 ANTIVIRUS SOFTWARE
 ANTIVIRUS SOFTWARE TYPES
 ANTIVIRUS PROGRAM
What is Anti-Virus
 Antivirus or anti-virus software (often abbreviated as AV),
sometimes known as anti-malware software, is computer
software used to prevent, detect and remove malicious
software.
 Antivirus software was originally developed to detect and
remove computer viruses.
 In particular, modern antivirus software can protect from:
malicious browser helper objects (BHOs), browser hijackers,
ransomware, keyloggers, backdoors, rootkits, trojan horses,
worms, malicious LSPs, dialers, fraudtools, adware and
spyware.
 Some products also include protection from other computer
threats, such as infected and malicious URLs, spam, scam
and phishing attacks, online identity (privacy), online
banking attacks, social engineering techniques, advanced
persistent threat (APT) and botnet DDoS attacks
History
 In the early 1980s, Internet security was
practically nonexistent. No large-scale
attacks had ever been attempted, and
network-based vulnerabilities were rarely,
if ever, exploited. T
 his changed in the late 1980s with the
Morris Worm, the first known large-scale
attack propagated via the Internet.
 Today, spyware, viruses, trojan attacks,
worms, and malware are all common
occurrences affecting nearly every
computer user at least once.
Anti-Virus Types
1. Firewall software: Analyzes incoming and outgoing data
packets on a network; that is, all the information sent and
received through the computer's network connection.
2. Network layer firewalls: are called packet filters. These
firewalls are the simplest of firewalls, and only allow
information packets to pass through the firewall if the
packet matches a specific set of rules.
3. Proxy servers: act as a firewall in that they inspect
incoming packets for specific applications and block all
other requests.
4. Application Layer Firewalls: These firewalls inspect all
packets for specific protocols, such as FTP and browser
traffic.
Antivirus Software
 Antivirus software identifies, prevents, and removes
malware from a computer system.
 Malware is any number of viruses and software bits
that intend to harm the computer or steal
information, such as viruses, adware, rootkits,
backdoors, hijackers, keyloggers, spyware, trojans,
and worms.
 Modern antivirus software employs several methods
to detect and remove malware. However, no
antivirus software can detect and prevent all possible
malware.
Types of Antivirus Software
1. Signature Based Detection: The antivirus software can
then scan each file on the computer's hardware and memory
and compare the entire file, as well as small sections of
each file, against the virus signature database.
2. Heuristics: To help protect computers against new and
unknown malware, heuristic detection algorithms were
created.
3. Rootkit Detection: Rootkits are a particularly nasty form
of malware.
4. Real Time Protection: Most antivirus software provides
real-time protection, often under any number of clever
synonyms such as resident shield, background guard,
autoprotect, and so on.
5. Antispyware: software often provides real-time
protection, just like most antivirus software does.
Additionally, just like most antivirus software,
antispyware software relies on up to date spyware
signature definition files to work properly.
Antivirus Program
Conclusion
 Antivirus and security software has become an essential
part of modern computer use.
 Firewalls inspect the data flowing between the computer
and the Internet and attempt to filter out information
packets that seek to exploit vulnerabilities.
 Antivirus software has become quite sophisticated, often
involving signature-based detection methods, heuristic
detection methods, rootkit detection, and real-time
scanning to prevent computers from being infected with
malware.
 Antispyware software specifically protects the computer
from spyware, which can slow down the computer's
performance.

Weitere ähnliche Inhalte

Was ist angesagt?

Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
jnnj
 
Types of software
Types of softwareTypes of software
Types of software
latifah2001
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 

Was ist angesagt? (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Malware
MalwareMalware
Malware
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Antivirus
AntivirusAntivirus
Antivirus
 
Types of software
Types of softwareTypes of software
Types of software
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware and security
Malware and securityMalware and security
Malware and security
 

Andere mochten auch (7)

Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Roll Laptop
Roll LaptopRoll Laptop
Roll Laptop
 
Normative theory
Normative theoryNormative theory
Normative theory
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theory
 
Uses and Gratifications Theory
Uses and Gratifications TheoryUses and Gratifications Theory
Uses and Gratifications Theory
 

Ähnlich wie Anti virus

How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
Dom Cole
 

Ähnlich wie Anti virus (20)

Computer basic maintenance
Computer basic maintenanceComputer basic maintenance
Computer basic maintenance
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
information about virus
information about virusinformation about virus
information about virus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Firewall
FirewallFirewall
Firewall
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber security
Cyber security Cyber security
Cyber security
 
Stay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus SoftwareStay Secure: Unveiling the Power of Antivirus Software
Stay Secure: Unveiling the Power of Antivirus Software
 
How To Protect Your Computer
How To Protect Your ComputerHow To Protect Your Computer
How To Protect Your Computer
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Antivirus
AntivirusAntivirus
Antivirus
 

Mehr von Muhammad Sohaib Afzaal

Mehr von Muhammad Sohaib Afzaal (20)

Culture advertisement from marketing ads
Culture advertisement from marketing adsCulture advertisement from marketing ads
Culture advertisement from marketing ads
 
Mughal Architecture Palaces
Mughal Architecture PalacesMughal Architecture Palaces
Mughal Architecture Palaces
 
Modernity
ModernityModernity
Modernity
 
Conflict theory
Conflict theoryConflict theory
Conflict theory
 
Effects of the modernization process on human communication
Effects of the modernization process on human communicationEffects of the modernization process on human communication
Effects of the modernization process on human communication
 
Culture & types
Culture &  typesCulture &  types
Culture & types
 
Iconology
IconologyIconology
Iconology
 
Postmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalismPostmodernism or the cultural logic of late capitalism
Postmodernism or the cultural logic of late capitalism
 
Hybrid cultures,
Hybrid cultures,Hybrid cultures,
Hybrid cultures,
 
Firewall
FirewallFirewall
Firewall
 
News agencies & press laws
News agencies &  press lawsNews agencies &  press laws
News agencies & press laws
 
American online
American onlineAmerican online
American online
 
Development of Reuters
Development of ReutersDevelopment of Reuters
Development of Reuters
 
Impact of media
Impact of mediaImpact of media
Impact of media
 
Conspiracy Theory
Conspiracy TheoryConspiracy Theory
Conspiracy Theory
 
Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002Press council of pakistan ordinance, 2002
Press council of pakistan ordinance, 2002
 
Pemra
PemraPemra
Pemra
 
Theatre
TheatreTheatre
Theatre
 
Use of learning
Use of learningUse of learning
Use of learning
 
Media globalization through localization
Media globalization through localizationMedia globalization through localization
Media globalization through localization
 

Kürzlich hochgeladen

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 

Anti virus

  • 2. PRESENTED BY  FURQAN UMER KHAN B-18261  M. SOHAIB AFZAAL B-17545
  • 3. Content  INTRODUCTION  HISTORY  ANTIVIRUS TYPES  ANTIVIRUS SOFTWARE  ANTIVIRUS SOFTWARE TYPES  ANTIVIRUS PROGRAM
  • 4. What is Anti-Virus  Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software.  Antivirus software was originally developed to detect and remove computer viruses.  In particular, modern antivirus software can protect from: malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.  Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks
  • 5. History  In the early 1980s, Internet security was practically nonexistent. No large-scale attacks had ever been attempted, and network-based vulnerabilities were rarely, if ever, exploited. T  his changed in the late 1980s with the Morris Worm, the first known large-scale attack propagated via the Internet.  Today, spyware, viruses, trojan attacks, worms, and malware are all common occurrences affecting nearly every computer user at least once.
  • 6. Anti-Virus Types 1. Firewall software: Analyzes incoming and outgoing data packets on a network; that is, all the information sent and received through the computer's network connection. 2. Network layer firewalls: are called packet filters. These firewalls are the simplest of firewalls, and only allow information packets to pass through the firewall if the packet matches a specific set of rules. 3. Proxy servers: act as a firewall in that they inspect incoming packets for specific applications and block all other requests. 4. Application Layer Firewalls: These firewalls inspect all packets for specific protocols, such as FTP and browser traffic.
  • 7. Antivirus Software  Antivirus software identifies, prevents, and removes malware from a computer system.  Malware is any number of viruses and software bits that intend to harm the computer or steal information, such as viruses, adware, rootkits, backdoors, hijackers, keyloggers, spyware, trojans, and worms.  Modern antivirus software employs several methods to detect and remove malware. However, no antivirus software can detect and prevent all possible malware.
  • 8. Types of Antivirus Software 1. Signature Based Detection: The antivirus software can then scan each file on the computer's hardware and memory and compare the entire file, as well as small sections of each file, against the virus signature database. 2. Heuristics: To help protect computers against new and unknown malware, heuristic detection algorithms were created. 3. Rootkit Detection: Rootkits are a particularly nasty form of malware. 4. Real Time Protection: Most antivirus software provides real-time protection, often under any number of clever synonyms such as resident shield, background guard, autoprotect, and so on.
  • 9.
  • 10. 5. Antispyware: software often provides real-time protection, just like most antivirus software does. Additionally, just like most antivirus software, antispyware software relies on up to date spyware signature definition files to work properly.
  • 12. Conclusion  Antivirus and security software has become an essential part of modern computer use.  Firewalls inspect the data flowing between the computer and the Internet and attempt to filter out information packets that seek to exploit vulnerabilities.  Antivirus software has become quite sophisticated, often involving signature-based detection methods, heuristic detection methods, rootkit detection, and real-time scanning to prevent computers from being infected with malware.  Antispyware software specifically protects the computer from spyware, which can slow down the computer's performance.