SlideShare a Scribd company logo
1 of 20
CONTENTS
INTRODUCTION.
Similarities B/w Biological & Computer Virus.
How Does A Virus Work?
Life Cycle Of Computer Virus.
Functional Diagram of VIRUS.
Types Of VIRUS.
Methods Of Detecting Virus By ANTI-VIRUS.
Prevention.
COMPUTER VIRUS:
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and run against your wish.
OR
A virus is illegal computer code that can do such things as alter programs or
destroy data. Also, the virus can copy itself onto programs, thereby spreading
its damaging effects.
Similarities between biological virus
and computer virus:
Computer virus are called viruses because they share some of the traits of biological
Viruses. A computer virus passed from computer to computer like a biological virus
Passes from person to person
• Need a host for residence.
• Capable of self-replicate.
• Cause damage to host.
How Does A VIRUS Spread?
 first the virus is linked to the host object in such a
way that it activates when the host
object is used.
 Second virus looks for other suitable carrier
objects and attaches itself to them.
 With this dependency virus slows down the system.
How does a virus work?
The virus waits until user transmits the
infected object to another computer
User transmits an infected object to another
computer
The virus locates and infects suitable objects
on the new computer
VIRUS
ANTI-
DETECTIN
ROUTINES
COPY
SEARCH
TYPES OF VIRUS
MACRO VIRUS.
BOOT SECTOR VIRUS.
WORMS.
TROJEN HORSES.
LOGIC BOMBS.
MACRO VIRUS:
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded into
main memory and destroys the data
stored in hard disk.
BOOT SECTOR VIRUS
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
WORMS
A worm is also a destructive program
that fills a computer system with self-
replicating information.
Types of WORMS VIRUS:
MAIL WORM
PURE WORM
TROJAN HORSE
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
LOGICAL BOMBS
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
OTHERS
Time Bomb
Script Virus
Directory Virus
Signature-Based Detection-Compare the
contents of a file to a dictionary of virus.
Behavior -Based Detection:
Observe how the program execute in the computer
Rather than looking for signature .
Check the suspicious file and show warnings to the
user.
Heuristic -Based Detection:
 Detect and remove all threats.
 Create a generic signature.
PREVENTION
 Don't share Drive C: without a password and
without read-only restrictions.
 Use Anti-Virus.
 Delete e-mail file attachments.
 Have multiple backups of important files.
 More secure operating systems
e.g. UNIX
ANY
QUESTION
THANK YOU

More Related Content

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
What is malware
What is malwareWhat is malware
What is malware
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Viewers also liked

PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4NICHOLAS RATEMO
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computerDanielAtkinson96
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation PresentationJayesh Modi
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERRajat More
 
Computer Systems - Input, Process, Output
Computer Systems - Input, Process, OutputComputer Systems - Input, Process, Output
Computer Systems - Input, Process, Outputcorb201
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10Bogs De Castro
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (12)

PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Computer Systems - Input, Process, Output
Computer Systems - Input, Process, OutputComputer Systems - Input, Process, Output
Computer Systems - Input, Process, Output
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Basic concept of management
Basic concept of managementBasic concept of management
Basic concept of management
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to presentation on computer virus

Similar to presentation on computer virus (20)

Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer vrise
Computer vriseComputer vrise
Computer vrise
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 

Recently uploaded

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 

presentation on computer virus

  • 1.
  • 2. CONTENTS INTRODUCTION. Similarities B/w Biological & Computer Virus. How Does A Virus Work? Life Cycle Of Computer Virus. Functional Diagram of VIRUS. Types Of VIRUS. Methods Of Detecting Virus By ANTI-VIRUS. Prevention.
  • 3. COMPUTER VIRUS: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and run against your wish. OR A virus is illegal computer code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
  • 4. Similarities between biological virus and computer virus: Computer virus are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person • Need a host for residence. • Capable of self-replicate. • Cause damage to host.
  • 5. How Does A VIRUS Spread?  first the virus is linked to the host object in such a way that it activates when the host object is used.  Second virus looks for other suitable carrier objects and attaches itself to them.  With this dependency virus slows down the system. How does a virus work?
  • 6. The virus waits until user transmits the infected object to another computer User transmits an infected object to another computer The virus locates and infects suitable objects on the new computer
  • 8. TYPES OF VIRUS MACRO VIRUS. BOOT SECTOR VIRUS. WORMS. TROJEN HORSES. LOGIC BOMBS.
  • 9. MACRO VIRUS: A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk.
  • 10. BOOT SECTOR VIRUS A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 11. WORMS A worm is also a destructive program that fills a computer system with self- replicating information. Types of WORMS VIRUS: MAIL WORM PURE WORM
  • 12. TROJAN HORSE Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 13. LOGICAL BOMBS A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 15. Signature-Based Detection-Compare the contents of a file to a dictionary of virus.
  • 16. Behavior -Based Detection: Observe how the program execute in the computer Rather than looking for signature . Check the suspicious file and show warnings to the user.
  • 17. Heuristic -Based Detection:  Detect and remove all threats.  Create a generic signature.
  • 18. PREVENTION  Don't share Drive C: without a password and without read-only restrictions.  Use Anti-Virus.  Delete e-mail file attachments.  Have multiple backups of important files.  More secure operating systems e.g. UNIX