SlideShare a Scribd company logo
1 of 27
Week - 12 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Introduction
Computer Virus  ,[object Object],[object Object],[object Object]
Classification of Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Macro viruses  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Logic bomb  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Master Boot Record/Boot Sector Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Master Boot Record/Boot Sector Viruses ,[object Object],[object Object],[object Object],[object Object]
Multipartite Viruses  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Polymorphic Virus  ,[object Object],[object Object],[object Object],[object Object],[object Object]
File infectors  ,[object Object],[object Object],[object Object],[object Object]
Trojan Horse ,[object Object],[object Object],[object Object],[object Object],[object Object]
Trojan Horse  (Cont’d) ,[object Object],[object Object],[object Object]
Worms Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Famous Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Famous Viruses  (Cont’d) ,[object Object],[object Object],[object Object],[object Object]
Web Defacing ,[object Object],[object Object],[object Object],[object Object]
Protection against viruses ,[object Object],[object Object],[object Object],[object Object]
Antivirus Software  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Antivirus Software Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewalls  (Cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kerberos ,[object Object],[object Object],[object Object]
Biometrics ,[object Object],[object Object],[object Object],[object Object]
Steganography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Steganorgraphy  (Cont’d) ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Steganorgraphy  (Cont’d)

More Related Content

What's hot

المحاضرة2
المحاضرة2المحاضرة2
المحاضرة2almgd33
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...innoKeen
 
دورة صيانة مختصر
دورة صيانة مختصردورة صيانة مختصر
دورة صيانة مختصرYounes Almansoob
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
بوربوينت-المخدرات.pptx
بوربوينت-المخدرات.pptxبوربوينت-المخدرات.pptx
بوربوينت-المخدرات.pptxIsmailYMuhamadamin
 
(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلوماتDrMohammed Qassim
 
البرامج الخبيثة 11
البرامج الخبيثة 11البرامج الخبيثة 11
البرامج الخبيثة 11Salem Salem
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
malware
malware malware
malware
 
المحاضرة2
المحاضرة2المحاضرة2
المحاضرة2
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...
مميزات برنامج وثق للأرشفة الإلكترونية - برنامج أرشفة إلكترونية للمستندات والو...
 
دورة صيانة مختصر
دورة صيانة مختصردورة صيانة مختصر
دورة صيانة مختصر
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
بوربوينت-المخدرات.pptx
بوربوينت-المخدرات.pptxبوربوينت-المخدرات.pptx
بوربوينت-المخدرات.pptx
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات(Information security) مقدمة في أمن المعلومات
(Information security) مقدمة في أمن المعلومات
 
البرامج الخبيثة 11
البرامج الخبيثة 11البرامج الخبيثة 11
البرامج الخبيثة 11
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Malware
Malware Malware
Malware
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

Viewers also liked

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protectionscasyrichard
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Viewers also liked (6)

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 

Similar to W 12 computer viruses

Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 

Similar to W 12 computer viruses (20)

Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 

More from Institute of Management Studies UOP

2nd presentation the history and the study of the entrepreneurship in the his...
2nd presentation the history and the study of the entrepreneurship in the his...2nd presentation the history and the study of the entrepreneurship in the his...
2nd presentation the history and the study of the entrepreneurship in the his...Institute of Management Studies UOP
 

More from Institute of Management Studies UOP (20)

Hashim Khan Marketing MBA Marketing
Hashim Khan Marketing MBA MarketingHashim Khan Marketing MBA Marketing
Hashim Khan Marketing MBA Marketing
 
Swot analysis of the logistic at haier pakistan
Swot analysis of the logistic at haier pakistanSwot analysis of the logistic at haier pakistan
Swot analysis of the logistic at haier pakistan
 
Google Products Innovation
Google Products InnovationGoogle Products Innovation
Google Products Innovation
 
Operation Mgmt Lecture 3 by Yasir Anwar
Operation Mgmt Lecture 3 by Yasir AnwarOperation Mgmt Lecture 3 by Yasir Anwar
Operation Mgmt Lecture 3 by Yasir Anwar
 
2nd presentation the history and the study of the entrepreneurship in the his...
2nd presentation the history and the study of the entrepreneurship in the his...2nd presentation the history and the study of the entrepreneurship in the his...
2nd presentation the history and the study of the entrepreneurship in the his...
 
Baumol productive unproductive destructive
Baumol productive unproductive destructiveBaumol productive unproductive destructive
Baumol productive unproductive destructive
 
Cost Accounting Chapter 10
Cost Accounting Chapter 10Cost Accounting Chapter 10
Cost Accounting Chapter 10
 
Cost Accounting Chapter 9
Cost Accounting Chapter 9Cost Accounting Chapter 9
Cost Accounting Chapter 9
 
Cost Accounting Chapter 8
Cost Accounting Chapter 8Cost Accounting Chapter 8
Cost Accounting Chapter 8
 
Managerial Economics Chap 3
Managerial Economics Chap 3Managerial Economics Chap 3
Managerial Economics Chap 3
 
Managerial Economics Chap 2
Managerial Economics Chap 2Managerial Economics Chap 2
Managerial Economics Chap 2
 
Managerial Economics Chap 1
Managerial Economics Chap 1Managerial Economics Chap 1
Managerial Economics Chap 1
 
Williams07
Williams07Williams07
Williams07
 
Williams09
Williams09Williams09
Williams09
 
Brm 3
Brm 3Brm 3
Brm 3
 
Brm 2
Brm 2Brm 2
Brm 2
 
Brm 1
Brm 1Brm 1
Brm 1
 
Brm 3
Brm 3Brm 3
Brm 3
 
Logic & critical thinking (fallacies unit 3)
Logic & critical thinking (fallacies unit 3)Logic & critical thinking (fallacies unit 3)
Logic & critical thinking (fallacies unit 3)
 
Logic unit 1
Logic unit 1Logic unit 1
Logic unit 1
 

Recently uploaded

Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

W 12 computer viruses

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.

Editor's Notes

  1. A macro virus is a virus composed of a sequence of instructions that is interpreted rather than executed directly. • Macro viruses can infect either executables (Duff’s shell virus) or data files (Highland’s Lotus 1-2-3 spreadsheet virus). • Duff’s shell virus can execute on any system that can interpret the instructions
  2. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger ), should they ever be terminated from the company
  3. Macro Viruses infect Word or Excel documents and templates, Lotus AmiPro templates and Access database macro objects. An example is the Melissa Word Virus. Companion Viruses have a name similar to that of an application, but instead of using the “.exe” file extension, it uses “.com.”
  4. Multipartite Viruses infect the boot sector or Master Boot Record and also infect program files. A multipartite virus is a virus that can infect either boot sectors or executables. • Such a virus typically has two parts, one for each type. • When it infects an executable, it acts as an executable infector. • When it infects a boot sector, it works as a boot sector infector.
  5. A virus may be encrypted to try to disguise itself and hide what it does For an encrypted virus to actually run, it has to decrypt its code and data - The portion that does this is referred to as a decryptor Encryption techniques can use random keys to make the virus code hard to spot -However the decryptor itself will have a signature
  6. File Viruses infect program files and device drivers by attaching themselves to the program file or by inserting themselves into the program code.
  7. A Trojan horse is a program that hides within or looks like a legitimate programs.
  8. A Trojan horse is a program that hides within or looks like a legitimate programs.
  9. The following is a partial list of available antivirus software solutions. Compare these to see which might meet the needs of your organization. Aladdin Knowledge Systems - http://www.esafe.com Frisk Software International - http://www.complex.is Alwil Software - http://www.avast.com Kaspersky Lab - http://www.kaspersky.com AVG Antivirus - http://www.grisoft.com McAfee - http://www.mcafee.com Central Command, Inc. - http://www.centralcommand.com Network Associates, Inc. - http://www.nai.com Command Software Systems, Inc. - http://www.commandcom.com Norman Data Defense Sys - http://www.norman.com Computer Associates International - http://www.cai.com Panda Software - http://www.pandasoftware.com Data Fellows Corporation - http://www.datafellows.com Proland Software - http://www.pspl.com Dr. Solomon's Software, Inc. - http://www.drsolomon.com Sophos - http://www.sophos.com ESET Software - http://www.mod32.com Symantec Corporation - http://www.symantec.com Finjan Software - http://www.finjan.com Trend Micro, Inc. - http://www.trendmicro.com
  10. biometrics Traditionally, the science of measuring and analyzing human biological characteristics. In computer technology, biometrics relates to authentication and security techniques that rely on measurable, individual biological stamps to recognize or verify an individual’s identity. For example, fingerprints, handprints, or voice-recognition might be used to enable access to a computer, to a room, or to an electronic commerce account. Security schemes are generally categorized into three levels: level 1 relies on something the person carries, such as an ID badge with a photo or a computer cardkey; level 2 relies on something the person knows, such as a password or a code number; level 3, the highest level, relies on something that is a part of the person’s biological makeup or behavior, such as a fingerprint, the pattern of blood vessels in a retina, or a signature. See also voice recognition, fingerprint reader, handwriting recognition (definition 1).
  11. Methods of hiding the existence of a message or other data. This is different than cryptography, which hides the meaning of a message but does not hide the message itself.
  12. Stegnography - refers to hiding information in ways that prevent the detection of hidden messages used to communicate information without letting others even notice that a communication is being taken place