SlideShare une entreprise Scribd logo
1  sur  25
Submitted By
V.V.KAUSHIK
312106410035
What is computerVirus?
 Malware, on the other hand, is a much broader
term. Malware is simply short for "malicious
software” and it is defined as any type of software
that does mischief or permanent damage to your
computer.
 A computer virus is a piece of malicious computer
code that attaches itself to a software program,
email or computer file which damages your
software, hardware or files.
What can virus do?
 Viruses can trick you into buying fake software,
steal your personal information and use it to get to
your money, or be sold on the digital equivalent of
the black market. Powerful viruses are valuable and
potentially lucrative tools.
 Damage Software
 Slow your system
 Can take Control
 Steal Information
 Damage Data
 Traditional computer viruses were first widely seen
in the late 1980s, and came about because of
several factors. The main factor was the spread
of personal computers (PCs)
 Early viruses were pieces of code embedded in a
larger, legitimate program, such as a game or
word processor.When the user downloads and
runs the legitimate program, it looks around to
see if it can find any other programs ,modifies the
program to add the virus's code into that
program.Then the virus launches the "real
program.".The virus has now reproduced itself, so
two programs are infected.
Types
 Spyware
 Virus
 Worms
 Trojan Horse
 Bots
 Rootkit
 Adware
Adware
 The term adware is frequently used to describe a
form of malware(malicious software) which
presents unwanted advertisements to the user of a
computer.The advertisements produced by adware
are sometimes in the form of a pop-up or
sometimes in an "uncloseable window".
Spyware
 Spyware is a type of malware that is installed on a
computer without the knowledge of the owner in
order to collect the owner’s private information
 Spyware is often hidden from the user in order to
gather information about internet interaction,
keystrokes ,passwords without the knowledge of
the owner in order to collect the owner’s private
information
Virus
 A virus is a small piece of software that piggybacks
on real programs. For example, a virus might attach
itself to a program such as a spreadsheet program.
Each time the spreadsheet program runs, the virus
runs, too, and it has the chance to reproduce (by
attaching to other programs) or wreak havoc.
Bots
 A "bot" is a type of malware that allows an attacker
to take control over an affected computer.Also
known as “Web robots”, bots are usually part of a
network of infected machines, known as a
“botnet”, which is typically made up of victim
machines that stretch across the globe.
Trojan Horse
 The files which contains this virus, claim to be
desirable programs, but they are malicious
 A very important distinction from true viruses is
that they do not replicate themselves, as viruses
do.Trojan horses contain a malicious code which,
when triggered, causes loss or theft of data
Worm
 A type of computer virus that can replicate itself
over a computer network and perform destructive
tasks such as using up computer memory
resources.
 Worms do not infect other files as viruses typically
do, but instead worms make copies of themselves
over and over depleting system resources (hard
drive space) or depleting bandwidth (by spreading
over shared network resources
 A self-replicating virus that does not alter files but
resides in active memory and duplicates itself. Most
worms are spread as attachments to emails. It is
common for worms to be noticed only when their
uncontrolled replication consumes system
resources, slowing or halting other tasks
Rootkit
 A rootkit is a type of software designed to hide the
fact that an operating system has been
compromised, sometimes by replacing vital
executables.
 Rootkits allow viruses and malware to “hide in plain
sight” by disguising as necessary files that your
antivirus software will overlook.
 Rootkits themselves are not harmful; they are
simply used to hide malware, bots and worms.
How to Identify virus
 First you need to determine if your computer has
a virus at all.You might suspect your computer of
having a virus if it seems to be sluggish.
 If yourWeb browser suddenly looks different or
automatically goes to a site you don't recognize,
that's a good indication that you've got some
malware.
 If your computer is unstable and crashes fairly
often, you may have a problem. And if you try to
access files but receive a message saying they're
corrupted, that's another sign.
 If you do think your computer has a virus, you need
to run antivirus software to weed it out. Some
viruses disable antivirus software -- they're clever
that way.
 A few malware variants will try to block you from
downloading antivirus software. If that's the case,
you may need to download the software on
another computer and transfer it to disk or a flash
drive.
How to protect from virus
Anti-virus
 An antivirus program is an essential part of a multi-
layered security strategy – even if you’re a smart
computer user, the constant stream of
vulnerabilities for browsers, plug-ins, and the
Windows operating system itself make antivirus
protection important.
 Antivirus programs are powerful pieces of software
that are essential onWindows computers.
 There are a lot anti-virus software available in the
market for purchase.
Types of Antivirus
On-Access Scanning
 Antivirus software runs in the background on your
computer, checking every file you open.This is
generally known as on-access scanning,
background scanning, resident scanning, real-time
protection, or something else, depending on your
antivirus program
 Antivirus programs also scan other types of files
that can contain viruses. For example, a .zip archive
file may contain compressed viruses, or aWord
document can contain a malicious macro.
Virus Definitions
 Your antivirus software relies on virus definitions to
detect malware.That’s why it automatically
downloads new, updated definition files – once a
day or even more often.
 The definition files contain signatures for viruses
and other malware that have been encountered in
the wild
 When an antivirus program scans a file and notices
that the file matches a known piece of malware, the
antivirus program stops the file from running,
putting it into “quarantine.” Depending on your
antivirus program’s settings, the antivirus program
may automatically delete the file
Heuristics
 Antivirus programs also employ heuristics.
Heuristics allow an antivirus program to identify
new or modified types of malware, even without
virus definition files.
 For example, if an antivirus program notices that a
program running on your system is trying to open
every EXE file on your system, infecting it by
writing a copy of the original program into it, the
antivirus program can detect this program as a
new, unknown type of virus.
Detection Rates
 Different antivirus programs have different
detection rates, which both virus definitions and
heuristics are involved in.
 AV-Comparative regularly releases studies that
compare the current state of antivirus detection
rates.The detection rates tend to fluctuate over
time – there’s no one best product that’s
consistently on top
 If you’re really looking to see just how effective an
antivirus program is and which are the best out
there, detection rate studies are the place to look.
AV-Comparative
Testing an Antivirus Program
 If you ever want to test whether an antivirus
program is working properly, you can use the EICAR
test file.
 The EICAR file is a standard way to test antivirus
programs – it isn’t actually dangerous, but antivirus
programs behave as if it’s dangerous, identifying it
as a virus.
THANK
YOU

Contenu connexe

Tendances

Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Tendances (20)

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 

Similaire à Computer virus

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 

Similaire à Computer virus (20)

Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus
VirusVirus
Virus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus
VirusVirus
Virus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
antivirus.pptx
antivirus.pptxantivirus.pptx
antivirus.pptx
 

Dernier

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Computer virus

  • 2. What is computerVirus?  Malware, on the other hand, is a much broader term. Malware is simply short for "malicious software” and it is defined as any type of software that does mischief or permanent damage to your computer.  A computer virus is a piece of malicious computer code that attaches itself to a software program, email or computer file which damages your software, hardware or files.
  • 3. What can virus do?  Viruses can trick you into buying fake software, steal your personal information and use it to get to your money, or be sold on the digital equivalent of the black market. Powerful viruses are valuable and potentially lucrative tools.  Damage Software  Slow your system  Can take Control  Steal Information  Damage Data
  • 4.  Traditional computer viruses were first widely seen in the late 1980s, and came about because of several factors. The main factor was the spread of personal computers (PCs)  Early viruses were pieces of code embedded in a larger, legitimate program, such as a game or word processor.When the user downloads and runs the legitimate program, it looks around to see if it can find any other programs ,modifies the program to add the virus's code into that program.Then the virus launches the "real program.".The virus has now reproduced itself, so two programs are infected.
  • 5. Types  Spyware  Virus  Worms  Trojan Horse  Bots  Rootkit  Adware
  • 6. Adware  The term adware is frequently used to describe a form of malware(malicious software) which presents unwanted advertisements to the user of a computer.The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "uncloseable window".
  • 7. Spyware  Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information  Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes ,passwords without the knowledge of the owner in order to collect the owner’s private information
  • 8. Virus  A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
  • 9. Bots  A "bot" is a type of malware that allows an attacker to take control over an affected computer.Also known as “Web robots”, bots are usually part of a network of infected machines, known as a “botnet”, which is typically made up of victim machines that stretch across the globe.
  • 10. Trojan Horse  The files which contains this virus, claim to be desirable programs, but they are malicious  A very important distinction from true viruses is that they do not replicate themselves, as viruses do.Trojan horses contain a malicious code which, when triggered, causes loss or theft of data
  • 11. Worm  A type of computer virus that can replicate itself over a computer network and perform destructive tasks such as using up computer memory resources.  Worms do not infect other files as viruses typically do, but instead worms make copies of themselves over and over depleting system resources (hard drive space) or depleting bandwidth (by spreading over shared network resources
  • 12.  A self-replicating virus that does not alter files but resides in active memory and duplicates itself. Most worms are spread as attachments to emails. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks
  • 13. Rootkit  A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables.  Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook.  Rootkits themselves are not harmful; they are simply used to hide malware, bots and worms.
  • 14. How to Identify virus  First you need to determine if your computer has a virus at all.You might suspect your computer of having a virus if it seems to be sluggish.  If yourWeb browser suddenly looks different or automatically goes to a site you don't recognize, that's a good indication that you've got some malware.  If your computer is unstable and crashes fairly often, you may have a problem. And if you try to access files but receive a message saying they're corrupted, that's another sign.
  • 15.  If you do think your computer has a virus, you need to run antivirus software to weed it out. Some viruses disable antivirus software -- they're clever that way.  A few malware variants will try to block you from downloading antivirus software. If that's the case, you may need to download the software on another computer and transfer it to disk or a flash drive. How to protect from virus
  • 16. Anti-virus  An antivirus program is an essential part of a multi- layered security strategy – even if you’re a smart computer user, the constant stream of vulnerabilities for browsers, plug-ins, and the Windows operating system itself make antivirus protection important.  Antivirus programs are powerful pieces of software that are essential onWindows computers.  There are a lot anti-virus software available in the market for purchase.
  • 18. On-Access Scanning  Antivirus software runs in the background on your computer, checking every file you open.This is generally known as on-access scanning, background scanning, resident scanning, real-time protection, or something else, depending on your antivirus program  Antivirus programs also scan other types of files that can contain viruses. For example, a .zip archive file may contain compressed viruses, or aWord document can contain a malicious macro.
  • 19. Virus Definitions  Your antivirus software relies on virus definitions to detect malware.That’s why it automatically downloads new, updated definition files – once a day or even more often.  The definition files contain signatures for viruses and other malware that have been encountered in the wild  When an antivirus program scans a file and notices that the file matches a known piece of malware, the antivirus program stops the file from running, putting it into “quarantine.” Depending on your antivirus program’s settings, the antivirus program may automatically delete the file
  • 20.
  • 21. Heuristics  Antivirus programs also employ heuristics. Heuristics allow an antivirus program to identify new or modified types of malware, even without virus definition files.  For example, if an antivirus program notices that a program running on your system is trying to open every EXE file on your system, infecting it by writing a copy of the original program into it, the antivirus program can detect this program as a new, unknown type of virus.
  • 22. Detection Rates  Different antivirus programs have different detection rates, which both virus definitions and heuristics are involved in.  AV-Comparative regularly releases studies that compare the current state of antivirus detection rates.The detection rates tend to fluctuate over time – there’s no one best product that’s consistently on top  If you’re really looking to see just how effective an antivirus program is and which are the best out there, detection rate studies are the place to look.
  • 24. Testing an Antivirus Program  If you ever want to test whether an antivirus program is working properly, you can use the EICAR test file.  The EICAR file is a standard way to test antivirus programs – it isn’t actually dangerous, but antivirus programs behave as if it’s dangerous, identifying it as a virus.