SlideShare ist ein Scribd-Unternehmen logo
1 von 16
COMPUTER
 VIRUSES
WHAT IS A COMPUTER
              VIRUS?

A computer virus is a small software program that spreads from one computer to
another computer and that interferes with computer operation. A computer virus
may corrupt or delete data on a computer, use an e-mail program to spread the
virus to other computers, or even delete everything on the hard disk.
.
CHARACTERISTICS OF A COMPUTER VIRUS:

 the ability to replicate itself.
 the ability to attach itself to another computer file.
WORKING OF COMPUTER
        VIRUS

     A Computer Virus needs another program in order to be able to
be activated and infect other computers files.

     For example, a virus might attach itself to a spreadsheet
program. Each time the program runs, the virus runs too.

     A file containing virus is called infested file.
TYPES OF COMPUTER VIRUSES
 Stealth viruses

 Use certain techniques to avoid detection.

 Macro Viruses

 Infects the macros within a document or template.

 Polymorphic viruses

 Encrypt its code in different ways

 Metamorphic viruses

 Rewrite themselves each time

 they infect a new file.
TYPES OF COMPUTER VIRUSES
 Boot viruses
 Affects boot sector of a floppy or hard disk.
 Program viruses
 Infect executable program files.
 Multipartite viruses
 A hybrid of Boot and Program viruses.
 Directory Virus
Directory viruses change the paths
 that indicate the location of a file
TROJAN HORSE

Covert

Leaks information

Usually does not reproduce
WORMS

Spread over network connection
Worms replicate
First worm released on the Internet was called
Morris worm, it was released on Nov 2, 1988.
WHAT CAN VIRUSES DO?

 Format hard disk

 Copy, rename and delete files

 Modify files dates and extensions

 Display false message every few times

 Damage data

 Damage software
SYMPTOMS
 Computer runs slowly

 Random restarts

 Unknown and uninstalled icons on desktop

 Icons change in appearance

 System memory and disk space is reduced

 New windows open up at an alarming rate

 Error messages on regular basis

 Files mysteriously disappear
HOW VIRUS SPREADS?
 Email
  Opening and downloading an email containing virus
 Networks
  Connecting with network that contains virus
 Removable Storage Media
  Floppy discs, CDs and flash devices
 Pirated Software
  Installing pirated software that contains virus
W H O C R E A T E S V I RU S E S A N D W H Y ?
Common people:

 For fun

 Release anger

 Take revenge

 For fame

Profit earners:

 Antivirus market

Info attackers:

 Disrupt enemy’s information and network
HOW TO PROTECT FROM
              VIRUS?
 Latest antivirus should be installed

 Antivirus software must be upgraded regularly

 Unknown emails should not be opened

 Unauthorized software should not be installed

 Removable storage media should be scanned

 Freeware and shareware software from internet should be checked
before installing
TOP SEVEN ANTIVIRAL
  PROGRAMS
     Kaspersky Antivirus
      Avira Antivirus
     Mcafee Antivirus
     Symantec Norton Antivirus
     Bit Defender 2010
     Quick Heal Antivirus
     AVG Antivirus
GENERAL SECURITY TIPS
      Apply user-level security on file sharing when
         needed.
      Don't open email attachments from unknown
         senders.
      Use Rich Text Format files instead of Word
         Documents.
      Updated anti-virus program
      Set the BIOS boot sequence
      Write protection
1311782 634629102605888750

Weitere ähnliche Inhalte

Was ist angesagt?

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virussameer1993
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 

Was ist angesagt? (20)

What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Virus slides
Virus slidesVirus slides
Virus slides
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus
virusvirus
virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Ähnlich wie 1311782 634629102605888750

Ähnlich wie 1311782 634629102605888750 (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
viruses
virusesviruses
viruses
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses
VirusesViruses
Viruses
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 

Kürzlich hochgeladen

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Kürzlich hochgeladen (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

1311782 634629102605888750

  • 2. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk. . CHARACTERISTICS OF A COMPUTER VIRUS:  the ability to replicate itself.  the ability to attach itself to another computer file.
  • 3. WORKING OF COMPUTER VIRUS A Computer Virus needs another program in order to be able to be activated and infect other computers files. For example, a virus might attach itself to a spreadsheet program. Each time the program runs, the virus runs too. A file containing virus is called infested file.
  • 4. TYPES OF COMPUTER VIRUSES  Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt its code in different ways  Metamorphic viruses Rewrite themselves each time they infect a new file.
  • 5. TYPES OF COMPUTER VIRUSES  Boot viruses Affects boot sector of a floppy or hard disk.  Program viruses Infect executable program files.  Multipartite viruses A hybrid of Boot and Program viruses.  Directory Virus Directory viruses change the paths that indicate the location of a file
  • 6.
  • 8. WORMS Spread over network connection Worms replicate First worm released on the Internet was called Morris worm, it was released on Nov 2, 1988.
  • 9. WHAT CAN VIRUSES DO?  Format hard disk  Copy, rename and delete files  Modify files dates and extensions  Display false message every few times  Damage data  Damage software
  • 10. SYMPTOMS  Computer runs slowly  Random restarts  Unknown and uninstalled icons on desktop  Icons change in appearance  System memory and disk space is reduced  New windows open up at an alarming rate  Error messages on regular basis  Files mysteriously disappear
  • 11. HOW VIRUS SPREADS?  Email Opening and downloading an email containing virus  Networks Connecting with network that contains virus  Removable Storage Media Floppy discs, CDs and flash devices  Pirated Software Installing pirated software that contains virus
  • 12. W H O C R E A T E S V I RU S E S A N D W H Y ? Common people:  For fun  Release anger  Take revenge  For fame Profit earners:  Antivirus market Info attackers:  Disrupt enemy’s information and network
  • 13. HOW TO PROTECT FROM VIRUS?  Latest antivirus should be installed  Antivirus software must be upgraded regularly  Unknown emails should not be opened  Unauthorized software should not be installed  Removable storage media should be scanned  Freeware and shareware software from internet should be checked before installing
  • 14. TOP SEVEN ANTIVIRAL PROGRAMS Kaspersky Antivirus  Avira Antivirus Mcafee Antivirus Symantec Norton Antivirus Bit Defender 2010 Quick Heal Antivirus AVG Antivirus
  • 15. GENERAL SECURITY TIPS  Apply user-level security on file sharing when needed.  Don't open email attachments from unknown senders.  Use Rich Text Format files instead of Word Documents.  Updated anti-virus program  Set the BIOS boot sequence  Write protection