SlideShare ist ein Scribd-Unternehmen logo
COMPUTER
VIRUSES
5/17/2024
1
definition signs prevention types
Definition
A computer virus is a type of malicious
software, or malware, that spreads
between computers and causes damage to
data and software.
Computer viruses aim to disrupt systems,
cause major operational issues, and result
in data loss and leakage. A key thing to
know about computer viruses is that they
are designed to spread across programs
and systems.
5/17/2024
2
Signs
• Speed of System - A computer system running
slower than usual is one of the most common
signs that the device has a virus. This includes
the system itself running slowly, as well as
applications and internet speed suffering. If a
computer does not have powerful applications
or programs installed and is running slowly,
then it may be a sign it is infected with a virus.
• Pop-up Windows
definition signs prevention types
5/17/2024
3
prevention
• Use Trusted Antivirus
Products.
• Avoid Clicking Pop-up
Advertisements
• Scan Your Email Attachments
• Scan the Files That You
Download Using File-sharing
Programs
definition signs prevention types
5/17/2024
4
• Resident Virus - Viruses propagate
themselves by infecting applications on a
host computer. A resident virus achieves
this by infecting applications as they are
opened by a user. A non-resident virus is
capable of infecting executable files when
programs are not running.
• Multipartite Virus - A multipartite virus
uses multiple methods to infect and spread
across computers
Types
types types types types
5/17/2024
5
• Direct Action - A direct action virus
accesses a computer’s main memory and
infects all programs, files, and folders
located in the autoexec.bat path, before
deleting itself.
• Browser Hijacker - A browser hijacker
manually changes the settings of web
browsers, such as replacing the homepage,
editing the new tab page, and changing the
default search engine
Types
types types types types
5/17/2024
6
• Overwrite Virus - Overwrite viruses are
extremely dangerous. They can delete data
and replace it with their own file content or
code. Once files get infected, they cannot be
replaced, and the virus can affect Windows,
DOS, Linux, and Apple systems
• Web Scripting Virus - A web scripting
virus attacks web browser security,
enabling a hacker to inject web-pages with
malicious code
Types
types types types types
5/17/2024
7
• File Infector - A file infector is one of the
most common computer viruses. It
overwrites files when they are opened and
can quickly spread across systems and
networks. It largely affects files with .exe or
.com extensions. The best way to avoid file
infector viruses is to only download official
software and deploy an antivirus solution.
Types
types types types types
5/17/2024
8
• Network Virus - Network viruses are
extremely dangerous because they can
completely cripple entire computer
networks. They are often difficult to
discover, as the virus could be hidden
within any computer on an infected
network
Types
types types types types
5/17/2024
9
THANK
YOU
Any Questions..? 10

Weitere ähnliche Inhalte

Ähnlich wie a pptx presentation file about computer viruses

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
DiveshRajpoot
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
vndoon
 
computer Virus
computer Virus computer Virus
computer Virus
VC Infotech
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdf
SamiAAli44
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Computer virus
Computer virusComputer virus
Computer virus
Maxie Santos
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
SreelekshmiAS11
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rajah Anuragavan
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
Rakibul islam
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 

Ähnlich wie a pptx presentation file about computer viruses (20)

What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
computer Virus
computer Virus computer Virus
computer Virus
 
virus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdfvirus-140717152102-phpapp02.pdf
virus-140717152102-phpapp02.pdf
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 

Kürzlich hochgeladen

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Kürzlich hochgeladen (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

a pptx presentation file about computer viruses

  • 2. definition signs prevention types Definition A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key thing to know about computer viruses is that they are designed to spread across programs and systems. 5/17/2024 2
  • 3. Signs • Speed of System - A computer system running slower than usual is one of the most common signs that the device has a virus. This includes the system itself running slowly, as well as applications and internet speed suffering. If a computer does not have powerful applications or programs installed and is running slowly, then it may be a sign it is infected with a virus. • Pop-up Windows definition signs prevention types 5/17/2024 3
  • 4. prevention • Use Trusted Antivirus Products. • Avoid Clicking Pop-up Advertisements • Scan Your Email Attachments • Scan the Files That You Download Using File-sharing Programs definition signs prevention types 5/17/2024 4
  • 5. • Resident Virus - Viruses propagate themselves by infecting applications on a host computer. A resident virus achieves this by infecting applications as they are opened by a user. A non-resident virus is capable of infecting executable files when programs are not running. • Multipartite Virus - A multipartite virus uses multiple methods to infect and spread across computers Types types types types types 5/17/2024 5
  • 6. • Direct Action - A direct action virus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself. • Browser Hijacker - A browser hijacker manually changes the settings of web browsers, such as replacing the homepage, editing the new tab page, and changing the default search engine Types types types types types 5/17/2024 6
  • 7. • Overwrite Virus - Overwrite viruses are extremely dangerous. They can delete data and replace it with their own file content or code. Once files get infected, they cannot be replaced, and the virus can affect Windows, DOS, Linux, and Apple systems • Web Scripting Virus - A web scripting virus attacks web browser security, enabling a hacker to inject web-pages with malicious code Types types types types types 5/17/2024 7
  • 8. • File Infector - A file infector is one of the most common computer viruses. It overwrites files when they are opened and can quickly spread across systems and networks. It largely affects files with .exe or .com extensions. The best way to avoid file infector viruses is to only download official software and deploy an antivirus solution. Types types types types types 5/17/2024 8
  • 9. • Network Virus - Network viruses are extremely dangerous because they can completely cripple entire computer networks. They are often difficult to discover, as the virus could be hidden within any computer on an infected network Types types types types types 5/17/2024 9