SlideShare une entreprise Scribd logo
1  sur  25
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],1 2
[object Object],[object Object],[object Object],[object Object],[object Object]
no… … not… …  this kind 4
[object Object],[object Object],[object Object],5
 
6 7 9 8
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
10 11 12
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],13
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],14
[object Object],[object Object],15
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],13
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],13
Virus Process Virus Cycle 16 16
17 Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100  3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000  7 MS Blaster 2003 100 – 150  8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30
[object Object],18 20 19 Such as… 20
[object Object],[object Object],21
no… … not… …  these kinds 22 23 ?
[object Object],[object Object],16
[object Object],[object Object],16
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
24

Contenu connexe

Tendances

Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesadni_shadah
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its HistorySunil Kafle
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran universityRebaz Hamad
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 

Tendances (19)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its History
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms analysis
Virus and worms analysisVirus and worms analysis
Virus and worms analysis
 
Information security
Information securityInformation security
Information security
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 

En vedette

CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"Mikee Monte de Ramos
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...COWCATCHER Publications
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICTCJ900
 

En vedette (7)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"CLASSROOM MANAGEMENT:  "Teacher's Crimes in the Class"
CLASSROOM MANAGEMENT: "Teacher's Crimes in the Class"
 
Chemistry pbl
Chemistry pblChemistry pbl
Chemistry pbl
 
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
Frustrated Teachers -Student Discipline and Classroom Management Strategies t...
 
Health issues of ICT
Health issues of ICTHealth issues of ICT
Health issues of ICT
 

Similaire à Virus worm trojan

Similaire à Virus worm trojan (20)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus
VirusVirus
Virus
 
virus
virusvirus
virus
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti virus
Anti virusAnti virus
Anti virus
 

Virus worm trojan

  • 1.  
  • 2.
  • 3.
  • 4.
  • 5. no… … not… … this kind 4
  • 6.
  • 7.  
  • 8. 6 7 9 8
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Virus Process Virus Cycle 16 16
  • 17. 17 Rate Name Year Cost ($ Million) 1 Morris 1998 10 – 100 2 Melissa 1999 60 – 100 3 Love Letter 2000 5.5 4 Code Red 2001 2.6 5 Nimda 2001 635 6 SQL Slammer 2003 750 – 1000 7 MS Blaster 2003 100 – 150 8 MyDoom 2004 250 9 Sasser 2004 120 10 Witty 2004 10 – 30
  • 18.
  • 19.
  • 20. no… … not… … these kinds 22 23 ?
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. 24