SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Seminar On Computer
Worms, Viruses Trojans & It’s Prevention
Submitted to:
Dr. S.R.Sirsat Sir
(Head of department)
(Department of Computer Science)
Submitted By:
Pratimesh Pathak
B.Sc II year
preface
I have made this presentation file on the topic COMPUTER
WORMS AND VIRUSES and it’s prevention. I have tried my best to
present all the details and difference Between Computer worms and
viruses. In the beginning I have tried to give you general information on
this topic.
I express my sincere gratitude to Dr.S.R.Sirsat sir
Prof. S.S.Wawre mam & Prof. Umesh Gadhve sir who assisting me
throughout the preparation of this topic. I thank him for providing me the
confidence performing act and most importantly the track of the topic
whenever I needed it.
Content:
• Introduction.
• Life Cycle Of Computer Viruses
• Type of worms.
• Types of viruses.
• Types of Trojans.
• Difference between Computer worms Viruses and Trojans.
• Symptoms of worms.
• Symptoms of viruses.
• Symptoms of Trojans.
• Top 5 sources.
• Prevention and cure.
• Types of Antivirus.
• Types of Antivirus Product.
• How Antivirus Software Works.
• Norton Antivirus, MacAfee Virus Scan, Kaspersky Anti-
virus.
• Conclusion.
Introduction
VIRUSES: A computer virus is a program that reproduces its own code by
attaching itself to other executable files in such a way that the virus code is executed
when the infected executable file is executed.
WORMS: A computer worm is a standalone malware computer
programs that replicates itself in order to spread to other computers.
It uses a computer network spread itself, attack on security failures on the target
computer to access it.
Trojan: A Computer Trojans is a harmful piece of software that looks legal.
Users are typically tricked into loading and executing it on their systems.
After it is activated, it can achieve any number of attacks on the host, from
irritating the user to damaging the host.
A typical Life cycle of computer virus
Types Of Worms
Email
Worm
Internet
Worm
Instant
Messaging
Worm
File Sharing
Network
Worm
Types Of Viruses
Macro
Viruses
Overwrite
Viruses
Direct Action
Viruses
Multipartite
Viruses
Types Of Trojans
Exploit: Backdoor: Rootkit: Ransom:Spy:
Differences Computer Viruses Computer Worms Trojans
Definition The virus is the program
code that attaches itself to
application program and
when application program
run it runs along with it
The worm is code that
replicate itself in order
to consume resources
to bring it down.
A Trojan is another type of malware
which is a harmful piece of software that
looks legitimate
How it infect
a computer
It inserts itself into a file or
executable program
It exploits a weakness
in an application.
A Trojans Horse is similar to viruses and
worms but it doesn’t spread or reproduce.
How can it
spread?
It has to rely on users
transferring infected
files/programs to other
computer systems
It has to rely on users
transferring infected
files/programs to other
computer systems
Its look similar to software but will actually
damage once installed or run it. When
installed its result is varied.
Does it infect
files?
Yes, it deletes or modifies
files. Sometimes a virus
also changes the location
of files.
Usually not. Worms
usually only
monopolize the CPU
and memory.
Trojans can cause servers damage such
as deleting files.
whose speed
is more?
virus is slower than worm worm is faster than
virus. E.g. The code
red worm affected 3
lack PCs in just 14
Hrs.
Once a computer is infected with a Trojan
virus, the malware perform destructive
harm on the target computer.
Symptoms : Worms
Symptoms: Viruses
Symptoms : Trojans
 Regularly update the program.
 Open E-mail attachment files only if you are expecting the attachment
files, or the sender is known and has confirmed sending the files.
 Try to avoid downloading and installing the illegal software from the
Internet.
 Install only registered copies of software the system.
 Install an Antivirus Software.
• There are types of antivirus software for
different computers.
1. Some are designed for personal computers.
2.Some are for servers and other for enterprises
• There are mainly two types of antivirus
software:
Specific & Generic.
 Depending on the installation method of the anti-virus
these can be in the following forms:
On-Access, On demand, and hardware.
 Depending on the way they fix viruses these can be in
the following forms:
Anti-virus, Anti-spyware and Anti-span application.
Source System
Interception
Disinfection
Destination System
Alert
How Anti-Virus Software Works:-
Some Anti-virus Software
1.Norton Anti-virus:
Norton Antivirus Is a product of Symantec cooperation
founded in 1982.
Norton checks following program:
I. Boot records.
II. Programs( all the time you used them)
III. All local Hard Disk.
IV. Files download from internet.
V. Usb (when in use)
MacAfee is an antivirus software and computer security
company head quartered in Santa Clara, California.
It markets MacAfee virus scan and related security products
and services, including the intercept and found stone brands.
2.MaCFee Virus Scan
3.Kaspersky Anti-virus
• Kaspersky is product of Kaspersky lab.
• A Russian computer security company.
• Co-founded by Natalya Kaspersky antivirus, do
the following thing.
• Invite virus scan by opening the Kaspersky
Antivirus window.
Conclusion.
 If virus And Worms Attack on our Computer it disturb
our System, corrupts data, Some time deletes data and
make harm to our computer.
 Hence, we need to keep safe our computer or any
device by using various antivirus software's.
 Do smart surfing on the Internet
 For better and Safe computation Anti-Virus software
should be installed and be helpful for global network
system.
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention

Weitere ähnliche Inhalte

Was ist angesagt?

computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and wormsrishi ram khanal
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirusPrakriti Sharma
 
Different between virus, worms, torzans
Different between virus, worms, torzansDifferent between virus, worms, torzans
Different between virus, worms, torzansPankaj Chandel
 
Computer virus
Computer virusComputer virus
Computer virusvazhichal12
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsSomanath Kavalase
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithmsUltraUploader
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviourYastee Shah
 
computer Virus
computer Virus computer Virus
computer Virus VC Infotech
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 

Was ist angesagt? (20)

computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Different between virus, worms, torzans
Different between virus, worms, torzansDifferent between virus, worms, torzans
Different between virus, worms, torzans
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Virus
VirusVirus
Virus
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Anti virus
Anti virusAnti virus
Anti virus
 
ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Analysis of virus algorithms
Analysis of virus algorithmsAnalysis of virus algorithms
Analysis of virus algorithms
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Types of virus and saviour
Types of virus and saviourTypes of virus and saviour
Types of virus and saviour
 
computer Virus
computer Virus computer Virus
computer Virus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 

Ähnlich wie Computer warms viruses trojans and its prevention

Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virus
VirusVirus
Virusdddaou
 
Computer Virus
Computer VirusComputer Virus
Computer Virusjangezkhan
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)allisterm
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Ähnlich wie Computer warms viruses trojans and its prevention (20)

Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus
VirusVirus
Virus
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

KĂźrzlich hochgeladen

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

KĂźrzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Computer warms viruses trojans and its prevention

  • 1. Seminar On Computer Worms, Viruses Trojans & It’s Prevention Submitted to: Dr. S.R.Sirsat Sir (Head of department) (Department of Computer Science) Submitted By: Pratimesh Pathak B.Sc II year
  • 2. preface I have made this presentation file on the topic COMPUTER WORMS AND VIRUSES and it’s prevention. I have tried my best to present all the details and difference Between Computer worms and viruses. In the beginning I have tried to give you general information on this topic. I express my sincere gratitude to Dr.S.R.Sirsat sir Prof. S.S.Wawre mam & Prof. Umesh Gadhve sir who assisting me throughout the preparation of this topic. I thank him for providing me the confidence performing act and most importantly the track of the topic whenever I needed it.
  • 3. Content: • Introduction. • Life Cycle Of Computer Viruses • Type of worms. • Types of viruses. • Types of Trojans. • Difference between Computer worms Viruses and Trojans. • Symptoms of worms. • Symptoms of viruses. • Symptoms of Trojans. • Top 5 sources. • Prevention and cure. • Types of Antivirus. • Types of Antivirus Product. • How Antivirus Software Works. • Norton Antivirus, MacAfee Virus Scan, Kaspersky Anti- virus. • Conclusion.
  • 4. Introduction VIRUSES: A computer virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed. WORMS: A computer worm is a standalone malware computer programs that replicates itself in order to spread to other computers. It uses a computer network spread itself, attack on security failures on the target computer to access it. Trojan: A Computer Trojans is a harmful piece of software that looks legal. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user to damaging the host.
  • 5. A typical Life cycle of computer virus
  • 7. Types Of Viruses Macro Viruses Overwrite Viruses Direct Action Viruses Multipartite Viruses
  • 8. Types Of Trojans Exploit: Backdoor: Rootkit: Ransom:Spy:
  • 9. Differences Computer Viruses Computer Worms Trojans Definition The virus is the program code that attaches itself to application program and when application program run it runs along with it The worm is code that replicate itself in order to consume resources to bring it down. A Trojan is another type of malware which is a harmful piece of software that looks legitimate How it infect a computer It inserts itself into a file or executable program It exploits a weakness in an application. A Trojans Horse is similar to viruses and worms but it doesn’t spread or reproduce. How can it spread? It has to rely on users transferring infected files/programs to other computer systems It has to rely on users transferring infected files/programs to other computer systems Its look similar to software but will actually damage once installed or run it. When installed its result is varied. Does it infect files? Yes, it deletes or modifies files. Sometimes a virus also changes the location of files. Usually not. Worms usually only monopolize the CPU and memory. Trojans can cause servers damage such as deleting files. whose speed is more? virus is slower than worm worm is faster than virus. E.g. The code red worm affected 3 lack PCs in just 14 Hrs. Once a computer is infected with a Trojan virus, the malware perform destructive harm on the target computer.
  • 13.
  • 14.  Regularly update the program.  Open E-mail attachment files only if you are expecting the attachment files, or the sender is known and has confirmed sending the files.  Try to avoid downloading and installing the illegal software from the Internet.  Install only registered copies of software the system.  Install an Antivirus Software.
  • 15. • There are types of antivirus software for different computers. 1. Some are designed for personal computers. 2.Some are for servers and other for enterprises • There are mainly two types of antivirus software: Specific & Generic.
  • 16.  Depending on the installation method of the anti-virus these can be in the following forms: On-Access, On demand, and hardware.  Depending on the way they fix viruses these can be in the following forms: Anti-virus, Anti-spyware and Anti-span application.
  • 18. Some Anti-virus Software 1.Norton Anti-virus: Norton Antivirus Is a product of Symantec cooperation founded in 1982. Norton checks following program: I. Boot records. II. Programs( all the time you used them) III. All local Hard Disk. IV. Files download from internet. V. Usb (when in use)
  • 19. MacAfee is an antivirus software and computer security company head quartered in Santa Clara, California. It markets MacAfee virus scan and related security products and services, including the intercept and found stone brands. 2.MaCFee Virus Scan
  • 20. 3.Kaspersky Anti-virus • Kaspersky is product of Kaspersky lab. • A Russian computer security company. • Co-founded by Natalya Kaspersky antivirus, do the following thing. • Invite virus scan by opening the Kaspersky Antivirus window.
  • 21. Conclusion.  If virus And Worms Attack on our Computer it disturb our System, corrupts data, Some time deletes data and make harm to our computer.  Hence, we need to keep safe our computer or any device by using various antivirus software's.  Do smart surfing on the Internet  For better and Safe computation Anti-Virus software should be installed and be helpful for global network system.