SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Topic:- Difference between Virus and Worms
SHRI VAISHNAV INSTITUTE OF
FORENSIC SCIENCE
Submitted to:
Mr. Dinesh Kamble Sir
SVIFS, Indore
Submitted By:
Arti Raghuvanshi
MSc Forensic Science
SVIFS, Indore
INTRODUCTION
VIRUSES :-
 A computer virus is a computer program that can copy itself
and infect a computer without permission or knowledge of the
user.
 Virus program must be executed in order to infect a computer
system.
 A virus cannot spread without human action to keep it going.
 EXAMPLES : Melissa,zeus,code red etc..
1
HOW VIRUS WORKS
User call for a legitimate program
The virus code, having inserted itself in the
order of execution, executes instead or in
addition to the legitimate program
The virus code terminates and returns
control to the legitimate program
2
3
TYPES OF VIRUSES
MULTIPARTI
TE VIRUS
BOOT
VIRUSES
MACRO
VIRUSES
FILE
INFECTORS
WORMS :
 Worm is a standalone malware computer program that
replicate itself in order to spread to other computers.
 It has capability to travel without human action.
 IT is an independent program that does not modify other
programs, but reproduces itself over and over again until it
slows down or shut down computer or network.
 EXAMPLE : The Morris worm, the storm worm etc..
4
WORMS CAN SPREAD THROUGH
Files found in email attachments.
Through a web link or FTP resource.
Links received through the ICQ and IRC
(Internet Relay Chat) message.
Via peer-to-peer file sharing networks
5
6
TTYPES OF WORMS
EMAIL
WORM
FILE SHARING
NETWORK
WORM
DSINSTANT
MESSAGING
WORM
INTERNET
WORM
DIFFERENCES COMPUTER VIRUSES COMPUTER WORMS
DEFINATION Virus is a program code
that attach itself to
application and when
application program run it
runs along with it
Worm code replicate itself
in order to consume
resources to bring it down
HOW DOES IT INFECT
COMPUTER
It insert itself into a file or
executable program
It exploits weakness in an
application or operating
system by replicating itself
HOW CAN IT SPREAD It has to rely on users
transferring infected
files/programs to other
computer system
It need not to rely on users
transferring infected
files/programs to other
computer system
DOES IT INFECT FILES Yes , it deletes or modify
files.
Usually not
WHOSE SPEED IS MORE Viruses slower than worms Worms are faster than
7
Top 5 sources of computer viruses and worms
attack
 DOWNLOADABLE PROGAMS
 CRACKED SOFTWARE
 E-MAIL ATTACHMENTS
 INTERNET
 BOOTING OF CD.
8
TROZAN HORSE
 A malicious computer program that can copy itself and infect a computer
without permission of knowledge of the user.
 They cannot replicate automatically.
 MAIN TYPES OF TROZAN HORSES
• Remote access trojans
• Data sending trojans
• Destructive trojans
• Proxy trojans
• File transfer protocol trojans
• Security software disable trojans
• Denial of services attack trojans
9
TRAPDOOR
 A computer trapdoor, also called back door, provides a secret or
undocumented method of gaining access to an application,
operating system or online service.
 Can be used legitimately by programmers to debug and test
programs.
 Trap doors become threat when they are used by unscrupulous
programmers to gain unauthorized access.
 EXAMPLES :
• A video game – like simulation mode and direct interaction with the
artificial intelligence
• Apps/games request in facebook ask us to allow the apps to access
your information
• Emilia attack
10
LOGIC BOMB
 One of the oldest types of malicious software
 Piece of code that executes itself when pre-defined conditions
are met
 Logic bombs that execute on certain days known as time
bombs
 Gets activated when certain conditions are met
- presence/absence of some files
- particular date/time
- particular user
 When triggered typically damages system
- modify/delete files/disks/halt machines etc
11
SUPER ZAPPING
 It is a technique made possible by a special program available
on most compute systems – a program that bypasses all
system controls when computer crashes and cannot be
restarted with normal recovery procedure.
 This program, infect, is a “master key” that can provide access
to any other part of the system.
 The super zap program is a highly privileged “disaster aid "that
very few computer system professionals are authorized to
use.
12
PROTECTING YOUR COMPUTER
 To ensure that operating system is up-to-date.
 To have antivirus software and make sure it has capability to
scan e-mail and files .
 Run a full disk scan periodically
 Try avoid downloading and installing software from untrusted
sources.
 Install only registered copies of software in the system.
 Use a firewall.
13
CONCLUSION
 If virus and worms attack on computer it disturb our
system,corrupts data,some times deletes and harm computer.
 Smart surfing is highly recommended.
 Avoiding third party downloads.
 Having a hardware-based firewall .
 Regularly backup for data.
 For better and safe computation Anti-virus software should be
installed
14
THANK YOU
15

Weitere ähnliche Inhalte

Was ist angesagt?

Improvised Firearms
Improvised FirearmsImprovised Firearms
Improvised FirearmsKetan Patil
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
PPT propellent and primers.pptx
PPT propellent and primers.pptxPPT propellent and primers.pptx
PPT propellent and primers.pptxAyush Choudhary
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICKUL2700
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writtingShanmukhaValli3
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidenceOnline
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxSoham Bhattacharya
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,Ishan Tiwari
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signatureShivangiRathore8
 
scope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptscope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptPallaviKumari112
 

Was ist angesagt? (20)

Improvised Firearms
Improvised FirearmsImprovised Firearms
Improvised Firearms
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Types of Bullet
Types of BulletTypes of Bullet
Types of Bullet
 
PPT propellent and primers.pptx
PPT propellent and primers.pptxPPT propellent and primers.pptx
PPT propellent and primers.pptx
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Arson
ArsonArson
Arson
 
Decipherment of indented writting
Decipherment of indented writtingDecipherment of indented writting
Decipherment of indented writting
 
ESDA
ESDAESDA
ESDA
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Class Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptxClass Characteristics of Handwriting.pptx
Class Characteristics of Handwriting.pptx
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Forensic Question Document Examination,
Forensic Question Document Examination,Forensic Question Document Examination,
Forensic Question Document Examination,
 
Forensic examination of signature
Forensic examination of signatureForensic examination of signature
Forensic examination of signature
 
GSR
GSRGSR
GSR
 
scope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptscope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.ppt
 

Ähnlich wie Difference between Virus and Worms Explained

Ähnlich wie Difference between Virus and Worms Explained (20)

Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Ch19
Ch19Ch19
Ch19
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Computer virus
Computer virus Computer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Ch19
Ch19Ch19
Ch19
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus project
Virus projectVirus project
Virus project
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Malicious
MaliciousMalicious
Malicious
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 

Mehr von DINESH KAMBLE

Mehr von DINESH KAMBLE (11)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Kürzlich hochgeladen

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 

Kürzlich hochgeladen (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 

Difference between Virus and Worms Explained

  • 1. Topic:- Difference between Virus and Worms SHRI VAISHNAV INSTITUTE OF FORENSIC SCIENCE Submitted to: Mr. Dinesh Kamble Sir SVIFS, Indore Submitted By: Arti Raghuvanshi MSc Forensic Science SVIFS, Indore
  • 2. INTRODUCTION VIRUSES :-  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  Virus program must be executed in order to infect a computer system.  A virus cannot spread without human action to keep it going.  EXAMPLES : Melissa,zeus,code red etc.. 1
  • 3. HOW VIRUS WORKS User call for a legitimate program The virus code, having inserted itself in the order of execution, executes instead or in addition to the legitimate program The virus code terminates and returns control to the legitimate program 2
  • 4. 3 TYPES OF VIRUSES MULTIPARTI TE VIRUS BOOT VIRUSES MACRO VIRUSES FILE INFECTORS
  • 5. WORMS :  Worm is a standalone malware computer program that replicate itself in order to spread to other computers.  It has capability to travel without human action.  IT is an independent program that does not modify other programs, but reproduces itself over and over again until it slows down or shut down computer or network.  EXAMPLE : The Morris worm, the storm worm etc.. 4
  • 6. WORMS CAN SPREAD THROUGH Files found in email attachments. Through a web link or FTP resource. Links received through the ICQ and IRC (Internet Relay Chat) message. Via peer-to-peer file sharing networks 5
  • 7. 6 TTYPES OF WORMS EMAIL WORM FILE SHARING NETWORK WORM DSINSTANT MESSAGING WORM INTERNET WORM
  • 8. DIFFERENCES COMPUTER VIRUSES COMPUTER WORMS DEFINATION Virus is a program code that attach itself to application and when application program run it runs along with it Worm code replicate itself in order to consume resources to bring it down HOW DOES IT INFECT COMPUTER It insert itself into a file or executable program It exploits weakness in an application or operating system by replicating itself HOW CAN IT SPREAD It has to rely on users transferring infected files/programs to other computer system It need not to rely on users transferring infected files/programs to other computer system DOES IT INFECT FILES Yes , it deletes or modify files. Usually not WHOSE SPEED IS MORE Viruses slower than worms Worms are faster than 7
  • 9. Top 5 sources of computer viruses and worms attack  DOWNLOADABLE PROGAMS  CRACKED SOFTWARE  E-MAIL ATTACHMENTS  INTERNET  BOOTING OF CD. 8
  • 10. TROZAN HORSE  A malicious computer program that can copy itself and infect a computer without permission of knowledge of the user.  They cannot replicate automatically.  MAIN TYPES OF TROZAN HORSES • Remote access trojans • Data sending trojans • Destructive trojans • Proxy trojans • File transfer protocol trojans • Security software disable trojans • Denial of services attack trojans 9
  • 11. TRAPDOOR  A computer trapdoor, also called back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.  Can be used legitimately by programmers to debug and test programs.  Trap doors become threat when they are used by unscrupulous programmers to gain unauthorized access.  EXAMPLES : • A video game – like simulation mode and direct interaction with the artificial intelligence • Apps/games request in facebook ask us to allow the apps to access your information • Emilia attack 10
  • 12. LOGIC BOMB  One of the oldest types of malicious software  Piece of code that executes itself when pre-defined conditions are met  Logic bombs that execute on certain days known as time bombs  Gets activated when certain conditions are met - presence/absence of some files - particular date/time - particular user  When triggered typically damages system - modify/delete files/disks/halt machines etc 11
  • 13. SUPER ZAPPING  It is a technique made possible by a special program available on most compute systems – a program that bypasses all system controls when computer crashes and cannot be restarted with normal recovery procedure.  This program, infect, is a “master key” that can provide access to any other part of the system.  The super zap program is a highly privileged “disaster aid "that very few computer system professionals are authorized to use. 12
  • 14. PROTECTING YOUR COMPUTER  To ensure that operating system is up-to-date.  To have antivirus software and make sure it has capability to scan e-mail and files .  Run a full disk scan periodically  Try avoid downloading and installing software from untrusted sources.  Install only registered copies of software in the system.  Use a firewall. 13
  • 15. CONCLUSION  If virus and worms attack on computer it disturb our system,corrupts data,some times deletes and harm computer.  Smart surfing is highly recommended.  Avoiding third party downloads.  Having a hardware-based firewall .  Regularly backup for data.  For better and safe computation Anti-virus software should be installed 14