SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Computer Malware
By:
JATIN KUMAR & CHANCHAL JANGRAL
(NIT HAMIRPUR)
(9882926918-9882877417)
Introduction
• Malware, short for malicious software is any kind of unwanted
software that is installed without your consent on your computer.
• It is intended to take control, permanent damage, or corrupt
computer systems.
Computer Malware and its types
Viruses
• Computer viruses are small software programs that are designed
to spread from one computer to another and to interfere with
computer operation.
• They cause huge economic damage each year.
• A virus cannot be spread without a human action, (such as
running an infected program) to keep it going.
History of Viruses
• First computer virus Brain was created by two brothers Basit Farooq
and Amjad Farooq Alvi in 1986.
• They created it because they customers were selling illegal copies of
software's made by them.
• The purpose of this virus was to infect the booting system of
computer and hence preventing it from booting.
Types of Virus
• Boot Sector Virus
• Web Scripting Virus
• Resident Virus
• Polymorphic Virus
Why do People Create Computer
Viruses?
• To take control of a computer and use it
for specific tasks.
• To steal sensitive information (credit
card numbers, passwords, personal
details, data etc.)
• To prove ones skill or for revenge purposes.
Latest computer virus: Ransomware
• Files of users were encrypted and
payment was demanded in order to
recover them.
• Payment was demanded in virtual
currency.
How do viruses spread..??
• From removable media like hard
drive, pen drive, SD cards.
 From downloads of the Internet
 From e-mail attachments
How to detect virus?
• Program takes longer to load.
• The program size keeps changing.
• Your computer functions slower than normal.
• You see uncommon error messages.
Worms
• A computer worm is similar to a computer virus, but unlike a virus it does
not need to attach itself to an existing program.
• It can spread copies of itself from one computer to another without being
activated by users.
• Worm is designed to replicate itself and disperse throughout the user’s
network.
Trojan Horse
• Trojan horses are applications which appear to be
useful, legitimate applications but run malicious,
hidden code.
• The application may appear to perform tasks, such
as scanning for viruses, but actually steal personal
data from your system.
.
Trojan Horse Cont.
• Trojans are not worms since they do not replicate ,
but Trojan horse programs can be just as destructive.
• Executing Trojans may result in changing desktop
wallpaper, creating pop-ups, or even deleting files
Actions to prevent virus infection
• Use an antivirus program and keep it up to date.
• Don’t open e-mail that you are not sure.
• Keep your Operating System up to date.
Actions to prevent virus infection
• Never use infected drives.
• Never clicks of fake pop-ups.
How Antivirus works..??
• It compares the specific bits of your
application with the bits that are present
in it’s database.
• If it matches with the database then it
considers it as virus.
QUESTIONS…
Computer Malware and its types

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 

Was ist angesagt? (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Malware
MalwareMalware
Malware
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Ähnlich wie Computer Malware and its types

Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threatAzri Abdin
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 

Ähnlich wie Computer Malware and its types (20)

Malicious
MaliciousMalicious
Malicious
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Malwares
MalwaresMalwares
Malwares
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Kürzlich hochgeladen

Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Kürzlich hochgeladen (20)

Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

Computer Malware and its types

  • 1. Computer Malware By: JATIN KUMAR & CHANCHAL JANGRAL (NIT HAMIRPUR) (9882926918-9882877417)
  • 2. Introduction • Malware, short for malicious software is any kind of unwanted software that is installed without your consent on your computer. • It is intended to take control, permanent damage, or corrupt computer systems.
  • 4. Viruses • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • They cause huge economic damage each year. • A virus cannot be spread without a human action, (such as running an infected program) to keep it going.
  • 5. History of Viruses • First computer virus Brain was created by two brothers Basit Farooq and Amjad Farooq Alvi in 1986. • They created it because they customers were selling illegal copies of software's made by them. • The purpose of this virus was to infect the booting system of computer and hence preventing it from booting.
  • 6. Types of Virus • Boot Sector Virus • Web Scripting Virus • Resident Virus • Polymorphic Virus
  • 7. Why do People Create Computer Viruses? • To take control of a computer and use it for specific tasks. • To steal sensitive information (credit card numbers, passwords, personal details, data etc.) • To prove ones skill or for revenge purposes.
  • 8. Latest computer virus: Ransomware • Files of users were encrypted and payment was demanded in order to recover them. • Payment was demanded in virtual currency.
  • 9. How do viruses spread..?? • From removable media like hard drive, pen drive, SD cards.
  • 10.  From downloads of the Internet  From e-mail attachments
  • 11. How to detect virus? • Program takes longer to load. • The program size keeps changing. • Your computer functions slower than normal. • You see uncommon error messages.
  • 12. Worms • A computer worm is similar to a computer virus, but unlike a virus it does not need to attach itself to an existing program. • It can spread copies of itself from one computer to another without being activated by users. • Worm is designed to replicate itself and disperse throughout the user’s network.
  • 13. Trojan Horse • Trojan horses are applications which appear to be useful, legitimate applications but run malicious, hidden code. • The application may appear to perform tasks, such as scanning for viruses, but actually steal personal data from your system. .
  • 14. Trojan Horse Cont. • Trojans are not worms since they do not replicate , but Trojan horse programs can be just as destructive. • Executing Trojans may result in changing desktop wallpaper, creating pop-ups, or even deleting files
  • 15. Actions to prevent virus infection • Use an antivirus program and keep it up to date. • Don’t open e-mail that you are not sure. • Keep your Operating System up to date.
  • 16. Actions to prevent virus infection • Never use infected drives. • Never clicks of fake pop-ups.
  • 17. How Antivirus works..?? • It compares the specific bits of your application with the bits that are present in it’s database. • If it matches with the database then it considers it as virus.