SlideShare ist ein Scribd-Unternehmen logo
1 von 21
A Computer Virus is a computer
program that can copy itself and
infect a computer without permission
or knowledge of the user
A virus can only spread
from one computer to
another when its host is
taken to the uninfected
computer, for instance by
a user sending it over a
network or the Internet,
or by carrying it on a
removable medium such
as a floppy disk, CD, or
USB drive.
On the basis of scale there are five types of
viruses under one name:
MALWARE
Spyware Adware Worms Trojans Rootkits
VIRUSES: WHAT THEY INFECT
1. System SectorViruses -DOS boot sector or the Master
Boot Record
2. File Viruses -Program (COM and EXE) files
3. Macro Viruses -Data files having macro programs
4. Companion Viruses -EXE files by installing a same-named
COM file
5. Cluster Viruses -Changes the DOS directory information so
that directory entries point to the virus code instead of the
actual program
6. Source Code Viruses -Source code, by adding Trojan code
to it
Malware, from the words
malicious and software, is
a software designed to
infiltrate or damage a
computer system without
the owner's informed
consent .It includes
spyware, adware,
computer worms and
trojan horses.
Spyware is computer
software that is installed
secretly on a personal
computer to intercept or
take partial control over
the user's interaction with
the computer, without the
user's informed consent.
Adware or advertising-
supported software is any
software package which
automatically plays,
displays, or downloads
advertisements to a
computer after the
software is installed on it
or while the application is
being used.
Computer Worm is a self-
replicating computer
program. It uses a network
to send copies of itself to
other nodes (computer
terminals on the network)
and it may do so without
any user intervention. It
always cause harm to the
network, if only by
consuming bandwidth
A Trojan, is malware
that appears to
perform a desirable
function but in fact
performs undisclosed
malicious functions
A Rootkit is a computer
virus which consists of a
program designed to take
fundamental control of a
computer system, without
authorization by the
system's owners and
legitimate managers.
 Operating System may slow
down.
 Change the length of executable
(*.com/*.exe) files.
 Change to the reassignment of
system resources.
 Showing some funny and
suspicious behaviour (blinking of
the mouse).
Signs of viruses:
ANTI - VIRUS
Anti-Virus Software are
computer programs that
attempt to identify,
neutralize or eliminate
malicious software. Most
modern antivirus software is
now designed to combat a
wide range of threats,
including worms, rootkits,
Trojans, often described
collectively as malware.
1. THE SIGNATURE
APPROACH:
Just like the police traces patterns in
crimes back to a criminal ,software
engineers can reverse engineer a
virus to find the signature it leaves .this
signature is added to the database so
that when buster performs a virus
scan, each file is scanned for matches
with any virus’ signature
2.THE SANDBOX APPROACH:
A ‘sandbox is an advanced
program that emulates an OS.A
suspect executable file is run
within the confines of a sandbox
and then the sandbox is examined
to see what changes were made.
3.THE HEURISTIC APPROACH:
This analyses a program for
‘seemingly’ malicious behavior
,heuristics is effective against
undocumented viruses .The buster of
the future might eliminate the need for
continual monitoring of new viruses.
1.Delete your browsing history, temporary
internet files, internet cookies before exiting .
2.Always remember to scan any removable
hardware using anti-virus software before accessing
it. Removable hardware includes Floppy Disks, CD,
USB Drive.
3.Scan your computer every week using anti-virus
software like Norton, McAfee for prevention against
malware
4.Update your anti-virus for new and latest virus definitions.
5.Create a system restore point before installing any software
or freeware.
Kaspersky Anti-Virus
Norton Antivirus
AVG Antivirus
NOD32 Antivirus
Panda Antivirus
CONCLUSION:
•VIRUSES HAVE STIMULATED SCIENTIFIC
THINKING AND IDEAS
•SOME IDEAS CAN ALSO BE EXPORTED INTO
MEDICAL SCIENCE
•VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE
USE(GOOD VIRUSES)
•EACH USER MUST REALIZE THE GRAVE DANGER
POSED BY VIRUSES
•TAKE STEPS TO PREVENT INFECTION, AND IN
CASE OF INFECTION, PROPER AND SAFE WAYS OF
DEALING WITH THE INFECTION
THANK YOU!

Weitere ähnliche Inhalte

Was ist angesagt?

How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

Was ist angesagt? (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Virus
VirusVirus
Virus
 

Ähnlich wie Computer viruses and antiviruses PPT

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 

Ähnlich wie Computer viruses and antiviruses PPT (20)

COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Computer viruses and antiviruses PPT

  • 1.
  • 2. A Computer Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user
  • 3. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 4. On the basis of scale there are five types of viruses under one name: MALWARE Spyware Adware Worms Trojans Rootkits
  • 5. VIRUSES: WHAT THEY INFECT 1. System SectorViruses -DOS boot sector or the Master Boot Record 2. File Viruses -Program (COM and EXE) files 3. Macro Viruses -Data files having macro programs 4. Companion Viruses -EXE files by installing a same-named COM file 5. Cluster Viruses -Changes the DOS directory information so that directory entries point to the virus code instead of the actual program 6. Source Code Viruses -Source code, by adding Trojan code to it
  • 6. Malware, from the words malicious and software, is a software designed to infiltrate or damage a computer system without the owner's informed consent .It includes spyware, adware, computer worms and trojan horses.
  • 7. Spyware is computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
  • 8. Adware or advertising- supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used.
  • 9. Computer Worm is a self- replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. It always cause harm to the network, if only by consuming bandwidth
  • 10. A Trojan, is malware that appears to perform a desirable function but in fact performs undisclosed malicious functions
  • 11. A Rootkit is a computer virus which consists of a program designed to take fundamental control of a computer system, without authorization by the system's owners and legitimate managers.
  • 12.  Operating System may slow down.  Change the length of executable (*.com/*.exe) files.  Change to the reassignment of system resources.  Showing some funny and suspicious behaviour (blinking of the mouse). Signs of viruses:
  • 14. Anti-Virus Software are computer programs that attempt to identify, neutralize or eliminate malicious software. Most modern antivirus software is now designed to combat a wide range of threats, including worms, rootkits, Trojans, often described collectively as malware.
  • 15. 1. THE SIGNATURE APPROACH: Just like the police traces patterns in crimes back to a criminal ,software engineers can reverse engineer a virus to find the signature it leaves .this signature is added to the database so that when buster performs a virus scan, each file is scanned for matches with any virus’ signature
  • 16. 2.THE SANDBOX APPROACH: A ‘sandbox is an advanced program that emulates an OS.A suspect executable file is run within the confines of a sandbox and then the sandbox is examined to see what changes were made.
  • 17. 3.THE HEURISTIC APPROACH: This analyses a program for ‘seemingly’ malicious behavior ,heuristics is effective against undocumented viruses .The buster of the future might eliminate the need for continual monitoring of new viruses.
  • 18. 1.Delete your browsing history, temporary internet files, internet cookies before exiting . 2.Always remember to scan any removable hardware using anti-virus software before accessing it. Removable hardware includes Floppy Disks, CD, USB Drive. 3.Scan your computer every week using anti-virus software like Norton, McAfee for prevention against malware 4.Update your anti-virus for new and latest virus definitions. 5.Create a system restore point before installing any software or freeware.
  • 19. Kaspersky Anti-Virus Norton Antivirus AVG Antivirus NOD32 Antivirus Panda Antivirus
  • 20. CONCLUSION: •VIRUSES HAVE STIMULATED SCIENTIFIC THINKING AND IDEAS •SOME IDEAS CAN ALSO BE EXPORTED INTO MEDICAL SCIENCE •VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE USE(GOOD VIRUSES) •EACH USER MUST REALIZE THE GRAVE DANGER POSED BY VIRUSES •TAKE STEPS TO PREVENT INFECTION, AND IN CASE OF INFECTION, PROPER AND SAFE WAYS OF DEALING WITH THE INFECTION