SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
ANTI VIRUS PACKAGES
V I R U S
!
Introduction to Virus.
Virus Protection, Deletion & Removal Utilities
Anti-Virus Packages to Prevent, detect & Delete Virus
Viruses, worms, Trojans, and bots are all pats of a class of software
called Malware.
Malware of malicious code is short for malicious software. It is code of
software that is specifically designed to damage, disrupt, steal, or in
general inflict some other “bad” of illegitimate action on data, hosts, or
networks.
Malware cannot damage the physical hardware of systems network
equipment, but is can damage the data and software residing on the
equipment.
What is Malware ?
INTRODUCTION TO VIRUS
A computer virus is a software programwith a abilityto make copies of itself , which
attacks itself to other application or files.
A virus cannot run by itself; it requires that its host programbe run to make the virus
active.
Almost all viruses are attached to an Executablefile.
Classification
VIRUS
4. TSR ( Terminateand stayresident )
1. Boot Virus
5. File infecting viruses ( ProgramVirus)
2. Micro Virus
3. Multipartite
1. Boot Viruses
Boot viruses infects the boot records of harddisk and floppy disks.
Generally these are consideredmore dangerous than programviruses.
A Boot record infectoris a piece of malware that inserts malicious code into
the boot sector of a disk.
2. Macro Virus
These viruses infects data files.
For example, Microsoft word document and template files are susceptibleto
macro virus attacks the spread rapidlyas infecteddocuments are sharedon
networks or downloaded frominternet sites.
3. Multipartite Virus
A multipartite virus is a virus that can infest eitherboot sectors or
executable.
Sucha virus typically has two parts, one for eachtype.
* When it infects an executable, it acts 3 as an executableinfector.
*When it infects a boot sector, it works as a boot sector infector.
4. Terminate and stay resident
A TSR virus is a virus that stays active in memory after the application ( or
bootstrapping, of disk mounting ) has terminated.
TSR viruses can be boot sector infectors or executable infectors.
The brain virus is a TSR virus.
5. File Infecting Viruses
These viruses infect programfiles, which have extensions such as .com, .exe,
.sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus
because they are widelyused and have relativity, simpleformats to which
viruses can attach themselves.
Types of Viruses
1) Worms 2) Trojan Horse 3) Bombs
1). Computer Worm
A computer Wormis a standalone malware computer programthat
replicates itself in order to spread to other computers.
Examples : Klez, Nimda, Code Redetc.
2). Trojan Horse Viruses
Trojan Horse, or Trojan, is any malicious computer programwhichis used
to hack into a computer by misleading users of its true intent.
Logic Bombs that execute a certain payloadat a pre-definedtime or when
some other condition is met. This technique can be usedby a virus or worm
to gain momentumand spreadbefore being noticed.
Logic Bombs are usually timed to do maximumdamage.
3). Logic Bombs
 Replicating itself
 Interrupting system/network use
 Modifying configuration settings
 FlashingBIOS
 Format hard drive/destroy data
 Using computer/network resources
 Distribution of confidential information
 Denial of service attacks
How do viruses work ?
Once a virus gains access to a computer, its effects can vary. Possible attacks include.
Sources of Computer Virus Attack
 Removal media or drives
 Downloading internet files
 E-mail attachments
 Unpatchedsoftware and services
 Poor Administrator passwords
 Poor shared passwords
Computer Security
 Patchingthe operating system
 Patchingservices
 Patchingclient software
 Passwords
 Antivirus
 Software
 Firelwalls
Virus Prevention
Perform Basic Computer Safety Maintenance
 Use an internet Firewall
 Update Your Computer
 Virus Detection ( Antivirus Software )
 Strong Passwords
 ValidCertificates before installing software
collezian
Click Here
Name : Md. Azad
Branch : Computer Science and Engineering
Governments Polytechnic Chapra

Weitere ähnliche Inhalte

Was ist angesagt?

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 

Was ist angesagt? (20)

Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Anti virus
Anti virusAnti virus
Anti virus
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Mitppt
MitpptMitppt
Mitppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 

Ähnlich wie Computer viruses

Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 

Ähnlich wie Computer viruses (20)

Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 

Kürzlich hochgeladen

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 

Kürzlich hochgeladen (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Computer viruses

  • 1. ANTI VIRUS PACKAGES V I R U S ! Introduction to Virus. Virus Protection, Deletion & Removal Utilities Anti-Virus Packages to Prevent, detect & Delete Virus
  • 2. Viruses, worms, Trojans, and bots are all pats of a class of software called Malware. Malware of malicious code is short for malicious software. It is code of software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” of illegitimate action on data, hosts, or networks. Malware cannot damage the physical hardware of systems network equipment, but is can damage the data and software residing on the equipment. What is Malware ?
  • 3. INTRODUCTION TO VIRUS A computer virus is a software programwith a abilityto make copies of itself , which attacks itself to other application or files. A virus cannot run by itself; it requires that its host programbe run to make the virus active. Almost all viruses are attached to an Executablefile.
  • 4. Classification VIRUS 4. TSR ( Terminateand stayresident ) 1. Boot Virus 5. File infecting viruses ( ProgramVirus) 2. Micro Virus 3. Multipartite
  • 5. 1. Boot Viruses Boot viruses infects the boot records of harddisk and floppy disks. Generally these are consideredmore dangerous than programviruses. A Boot record infectoris a piece of malware that inserts malicious code into the boot sector of a disk.
  • 6. 2. Macro Virus These viruses infects data files. For example, Microsoft word document and template files are susceptibleto macro virus attacks the spread rapidlyas infecteddocuments are sharedon networks or downloaded frominternet sites.
  • 7. 3. Multipartite Virus A multipartite virus is a virus that can infest eitherboot sectors or executable. Sucha virus typically has two parts, one for eachtype. * When it infects an executable, it acts 3 as an executableinfector. *When it infects a boot sector, it works as a boot sector infector.
  • 8. 4. Terminate and stay resident A TSR virus is a virus that stays active in memory after the application ( or bootstrapping, of disk mounting ) has terminated. TSR viruses can be boot sector infectors or executable infectors. The brain virus is a TSR virus.
  • 9. 5. File Infecting Viruses These viruses infect programfiles, which have extensions such as .com, .exe, .sys, .dll, .ovl or .scr. Programfiles are attractive targets for computer virus because they are widelyused and have relativity, simpleformats to which viruses can attach themselves.
  • 10. Types of Viruses 1) Worms 2) Trojan Horse 3) Bombs
  • 11. 1). Computer Worm A computer Wormis a standalone malware computer programthat replicates itself in order to spread to other computers. Examples : Klez, Nimda, Code Redetc.
  • 12. 2). Trojan Horse Viruses Trojan Horse, or Trojan, is any malicious computer programwhichis used to hack into a computer by misleading users of its true intent.
  • 13. Logic Bombs that execute a certain payloadat a pre-definedtime or when some other condition is met. This technique can be usedby a virus or worm to gain momentumand spreadbefore being noticed. Logic Bombs are usually timed to do maximumdamage. 3). Logic Bombs
  • 14.  Replicating itself  Interrupting system/network use  Modifying configuration settings  FlashingBIOS  Format hard drive/destroy data  Using computer/network resources  Distribution of confidential information  Denial of service attacks How do viruses work ? Once a virus gains access to a computer, its effects can vary. Possible attacks include.
  • 15. Sources of Computer Virus Attack  Removal media or drives  Downloading internet files  E-mail attachments  Unpatchedsoftware and services  Poor Administrator passwords  Poor shared passwords
  • 16. Computer Security  Patchingthe operating system  Patchingservices  Patchingclient software  Passwords  Antivirus  Software  Firelwalls Virus Prevention
  • 17. Perform Basic Computer Safety Maintenance  Use an internet Firewall  Update Your Computer  Virus Detection ( Antivirus Software )  Strong Passwords  ValidCertificates before installing software
  • 18. collezian Click Here Name : Md. Azad Branch : Computer Science and Engineering Governments Polytechnic Chapra