Discussed about computer malware and its types like virus, trojan horse, worms etc. and also discussed about antivirus and how an antivirus works. We have also discussed about types of viruses and some latest viruses like ransomware.
2. Introduction
• Malware, short for malicious software is any kind of unwanted
software that is installed without your consent on your computer.
• It is intended to take control, permanent damage, or corrupt
computer systems.
4. Viruses
• Computer viruses are small software programs that are designed
to spread from one computer to another and to interfere with
computer operation.
• They cause huge economic damage each year.
• A virus cannot be spread without a human action, (such as
running an infected program) to keep it going.
5. History of Viruses
• First computer virus Brain was created by two brothers Basit Farooq
and Amjad Farooq Alvi in 1986.
• They created it because they customers were selling illegal copies of
software's made by them.
• The purpose of this virus was to infect the booting system of
computer and hence preventing it from booting.
6. Types of Virus
• Boot Sector Virus
• Web Scripting Virus
• Resident Virus
• Polymorphic Virus
7. Why do People Create Computer
Viruses?
• To take control of a computer and use it
for specific tasks.
• To steal sensitive information (credit
card numbers, passwords, personal
details, data etc.)
• To prove ones skill or for revenge purposes.
8. Latest computer virus: Ransomware
• Files of users were encrypted and
payment was demanded in order to
recover them.
• Payment was demanded in virtual
currency.
9. How do viruses spread..??
• From removable media like hard
drive, pen drive, SD cards.
11. How to detect virus?
• Program takes longer to load.
• The program size keeps changing.
• Your computer functions slower than normal.
• You see uncommon error messages.
12. Worms
• A computer worm is similar to a computer virus, but unlike a virus it does
not need to attach itself to an existing program.
• It can spread copies of itself from one computer to another without being
activated by users.
• Worm is designed to replicate itself and disperse throughout the user’s
network.
13. Trojan Horse
• Trojan horses are applications which appear to be
useful, legitimate applications but run malicious,
hidden code.
• The application may appear to perform tasks, such
as scanning for viruses, but actually steal personal
data from your system.
.
14. Trojan Horse Cont.
• Trojans are not worms since they do not replicate ,
but Trojan horse programs can be just as destructive.
• Executing Trojans may result in changing desktop
wallpaper, creating pop-ups, or even deleting files
15. Actions to prevent virus infection
• Use an antivirus program and keep it up to date.
• Don’t open e-mail that you are not sure.
• Keep your Operating System up to date.
16. Actions to prevent virus infection
• Never use infected drives.
• Never clicks of fake pop-ups.
17. How Antivirus works..??
• It compares the specific bits of your
application with the bits that are present
in it’s database.
• If it matches with the database then it
considers it as virus.