SlideShare ist ein Scribd-Unternehmen logo
1 von 17
BY YouQTM
What is MALWARE ?
BY YouQTM
 Viruses, worms, Trojans, and bots are all part of a class
of software called malware.
 Malware or malicious code is short for malicious
software. It is code or software that is specifically
designed to damage, disrupt, steal, or in general inflict
some other “bad” or illegitimate action on data, hosts, or
networks.
 Malware cannot damage the physical hardware of
systems and network equipment, but it can damage the
data and software residing on the equipment.
Virus
BY YouQTM
 A computer virus is a software program with a ability to
make copies of itself ,which attacks itself to other
applications or files.
 A virus cannot run by itself; it requires that its host
program be run to make the virus active.
 Almost all viruses are attached to an executable file
.
The Computer Viruses are generally
classified as follows
BY YouQTM
1) Boot virus
2) TSR (Terminate and stay resident)
3) File infecting viruses (Program virus)
4) Micro virus
5) Multipartite
Boot viruses
BY YouQTM
 Boot viruses infects the boot records of hard disk
and floppy disks. Generally these are considered
more dangerous than program viruses.
 A boot record infector is a piece of malware that
inserts malicious code into the boot sector of a disk.
TSR (Terminate and stay resident)
BY YouQTM
 A TSRS virus is a virus that stays active in memory
after the application (or bootstrapping, or disk
mounting) has terminated.TSR viruses can be boot
sector infectors or executable infectors. The Brain
virus is a TSR virus.
FIV(Program viruses)
BY YouQTM
 These viruses infect program files, which have
extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or
.SCR. program files are attractive targets for
computer virus because they are widely used and
have relativity, simple formats to which viruses can
attach themselves.
Macro virus
BY YouQTM
 These viruses infects data files. For example,
Microsoft word document and template files are
susceptible to macro virus attacks they spread
rapidly as infected documents are shared on
networks or downloaded from internet sites.
Multipartite
BY YouQTM
 A multipartite virus is a virus that can infect either
boot sectors or executables. Such a virus typically
has two parts, one for each type. When it infects an
executable, it acts 3 as an executable infector. When
it infects a boot sector, it works as a boot sector
infector.
Types of Viruses
BY YouQTM
 Worms
 Trojan Horse
 Bombs
Computer Worm
BY YouQTM
 A computer worm is a standalone malware computer
program that replicates itself in order to spread to
other computers.
 Examples: Klez, Nimda, Code Red etc.
Trojan horse Viruses
BY YouQTM
 Trojan horse, or Trojan, is any
malicious computer program which is used to hack
into a computer by misleading users of its true
intent.
Logic bombs
BY YouQTM
 logic bombs that execute a certain payload at a
pre-defined time or when some other condition is
met. This technique can be used by a virus or worm
to gain momentum and spread before being noticed.
 Logic bombs are usually timed to do maximum
damage.
How do viruses work?
BY YouQTM
Once a virus gains access to a computer, its effects can vary. Possible
attacks include
• Replicating itself
• Interrupting system/network use
• Modifying configuration settings
• Flashing BIOS
• Format hard drive/destroy data
• Using computer/network resources
• Distribution of confidential info
• Denial of Service attacks
Sources of Computer Virus Attack
BY YouQTM
 Removable media or drives
• Downloading Internet files
• E-mail attachments
• Unpatched software and services
• Poor Administrator passwords
• Poor shared passwords
Computer Security
BY YouQTM
 Patching the operating system
• Patching services
• Patching client software
• Passwords
• Antivirus software
• Firewalls
Virus prevention
Perform Basic Computer Safety
Maintenance
BY YouQTM
 Use an Internet Firewall
 Update Your Computer
 Virus Detection (Antivirus software)
 Strong Passwords
 Valid Certificates before installing Software

Weitere ähnliche Inhalte

Was ist angesagt?

Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 

Was ist angesagt? (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Spyware
SpywareSpyware
Spyware
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer security and
Computer security andComputer security and
Computer security and
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 

Andere mochten auch

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Andere mochten auch (20)

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Chapter 01 introduction to Computer
Chapter 01 introduction to ComputerChapter 01 introduction to Computer
Chapter 01 introduction to Computer
 
01 - Introduction to Computer
01 - Introduction to Computer01 - Introduction to Computer
01 - Introduction to Computer
 
Introduction To Computer
Introduction To ComputerIntroduction To Computer
Introduction To Computer
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Noether環上の有限生成加群の有限表示
Noether環上の有限生成加群の有限表示Noether環上の有限生成加群の有限表示
Noether環上の有限生成加群の有限表示
 
Greatest science discovery till now 2017
Greatest science discovery till now 2017Greatest science discovery till now 2017
Greatest science discovery till now 2017
 
Duality of laplace transform
Duality of laplace transformDuality of laplace transform
Duality of laplace transform
 
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTIONGROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
GROUP FUZZY TOPSIS METHODOLOGY IN COMPUTER SECURITY SOFTWARE SELECTION
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
Think about having computer antivirus
Think about having computer antivirusThink about having computer antivirus
Think about having computer antivirus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 

Ähnlich wie Introduction to computer virus

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 

Ähnlich wie Introduction to computer virus (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Presentation2
Presentation2Presentation2
Presentation2
 
Mitppt
MitpptMitppt
Mitppt
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
viruses
virusesviruses
viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
TIC
TICTIC
TIC
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer virus
Computer virusComputer virus
Computer virus
 

Kürzlich hochgeladen

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Kürzlich hochgeladen (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Introduction to computer virus

  • 2. What is MALWARE ? BY YouQTM  Viruses, worms, Trojans, and bots are all part of a class of software called malware.  Malware or malicious code is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.  Malware cannot damage the physical hardware of systems and network equipment, but it can damage the data and software residing on the equipment.
  • 3. Virus BY YouQTM  A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications or files.  A virus cannot run by itself; it requires that its host program be run to make the virus active.  Almost all viruses are attached to an executable file .
  • 4. The Computer Viruses are generally classified as follows BY YouQTM 1) Boot virus 2) TSR (Terminate and stay resident) 3) File infecting viruses (Program virus) 4) Micro virus 5) Multipartite
  • 5. Boot viruses BY YouQTM  Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.  A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.
  • 6. TSR (Terminate and stay resident) BY YouQTM  A TSRS virus is a virus that stays active in memory after the application (or bootstrapping, or disk mounting) has terminated.TSR viruses can be boot sector infectors or executable infectors. The Brain virus is a TSR virus.
  • 7. FIV(Program viruses) BY YouQTM  These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR. program files are attractive targets for computer virus because they are widely used and have relativity, simple formats to which viruses can attach themselves.
  • 8. Macro virus BY YouQTM  These viruses infects data files. For example, Microsoft word document and template files are susceptible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.
  • 9. Multipartite BY YouQTM  A multipartite virus is a virus that can infect either boot sectors or executables. Such a virus typically has two parts, one for each type. When it infects an executable, it acts 3 as an executable infector. When it infects a boot sector, it works as a boot sector infector.
  • 10. Types of Viruses BY YouQTM  Worms  Trojan Horse  Bombs
  • 11. Computer Worm BY YouQTM  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.  Examples: Klez, Nimda, Code Red etc.
  • 12. Trojan horse Viruses BY YouQTM  Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  • 13. Logic bombs BY YouQTM  logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed.  Logic bombs are usually timed to do maximum damage.
  • 14. How do viruses work? BY YouQTM Once a virus gains access to a computer, its effects can vary. Possible attacks include • Replicating itself • Interrupting system/network use • Modifying configuration settings • Flashing BIOS • Format hard drive/destroy data • Using computer/network resources • Distribution of confidential info • Denial of Service attacks
  • 15. Sources of Computer Virus Attack BY YouQTM  Removable media or drives • Downloading Internet files • E-mail attachments • Unpatched software and services • Poor Administrator passwords • Poor shared passwords
  • 16. Computer Security BY YouQTM  Patching the operating system • Patching services • Patching client software • Passwords • Antivirus software • Firewalls Virus prevention
  • 17. Perform Basic Computer Safety Maintenance BY YouQTM  Use an Internet Firewall  Update Your Computer  Virus Detection (Antivirus software)  Strong Passwords  Valid Certificates before installing Software