SlideShare une entreprise Scribd logo
1  sur  12
Topic of discussion
Description of topic
Example of use
Importance to know about this topics
Suggestion to use it OR Steps to avoid it
(choose which is appropriate to your topics)
Source of Reference
INTRODUCTION
A computer virus is a computer program that can copy itself and infect a
computer without permission or knowledge of the user. The original may modify
the copies or the copies may modify themselves, as occurs in a metamorphic virus
. A virus can only spread from one computer to another when its host is taken to
the uninfected computer, for instance by a user sending it over a network or
carrying it on a removable medium such as a floppy disk, CD, USB drive or by the
Internet. Additionally, viruses can spread to other computers by infecting files on a
network file system or a file system that is accessed by another computer. Viruses
are sometimes confused with computer worms and Trojan horses. A worm,
however, can spread itself to other computers without needing to be transferred as
part of a host.
A Trojan horse is a file that appears harmless until executed. In contrast
to viruses, Trojan horses do not insert their code into other computer
files. Many personal computers are now connected to the Internet and to
local-area networks, facilitating their spread.
In the context of computer software, a Trojan horse is a program that installs
malicious software while under the guise of doing something else. A Trojan horse
differs from a virus in that a Trojan horse does not insert its code into other
computer files and appears harmless until executed. The term is derived from the
classical myth of the Trojan Horse. Trojan horses may appear to be useful or
interesting programs (or at the very least harmless) to an unsuspecting user, but
are actually harmful when executed. (See Social engineering.)
Often the term is shortened to simply Trojan.
There are two common types of Trojan horses. One is ordinary software that has
been corrupted by a hacker. A hacker inserts malicious code into the program that
executes while the program is used. Examples include various implementations of
weather alerting programs, computer clock setting software, and peer-to-peer file
sharing utilities. The other type of Trojan is a standalone program that
masquerades as something else, like a game or image file, in order to trick the
user into running the program.
Trojan horse programs cannot operate autonomously, in contrast to some other
types of malware, like viruses or worms. Just as the Greeks needed the Trojans
to bring the horse inside for their plan to work, Trojan horse programs depend on
actions by the intended victims. As such, if Trojans replicate and distribute
themselves, each new victim must run the Trojan. Therefore their virulence is of a
different nature, depending on successful implementation of social engineering
concepts rather than flaws in a computer system's security design or
configuration.
In the field of computer architecture, 'Trojan Horse' can also refer to security
loopholes that allow Kernel Code to access anything for which it is not authorized.
Some viruses are programmed to damage the computer by damaging
programs, deleting files, or reformatting the hard disk. Others are not
designed to do any damage, but simply replicate themselves and perhaps
make their presence known by presenting text, video, or audio messages.
Even these benign viruses can create problems for the computer user.
They typically take up computer memory used by legitimate programs. As
a result, they often cause erratic behavior and can result in system
crashes. In addition, many viruses are bug-ridden, and these bugs may
lead to system crashes and data loss.
There are many viruses operating in the general Internet today, and new
ones are created and discovered every day.
Today's viruses may also take advantage of
network services such as the World Wide Web,
e-mail, and file sharing systems to spread, blurring
the line between viruses and worms. Furthermore,
some sources use an alternative terminology in
which a virus is any form of self-replicating
malware.
The role of software development
Because software is often designed with security features to prevent
unauthorized use of system resources, many viruses must exploit
software bugs in a system or application to spread. Software development
strategies that produce large numbers of bugs will generally also produce
potential exploits.
Anti-virus software and other preventive
countermeasures
There are two common methods that an anti-virus software application uses to
detect viruses. The first, and by far the most common method of virus detection
is using a list of virus signature definitions. The disadvantage of this detection
method is that users are only protected from viruses that pre-date their last virus
definition update. The second method is to use a heuristic algorithm to find
viruses based on common behaviors. This method has the ability to detect
viruses that anti-virus security firms’ have yet to create a signature for.
Many users install anti-virus software that can detect and eliminate known
viruses after the computer downloads or runs the executable. They work by
examining the content heuristics of the computer's memory (its RAM, and
boot sectors) and the files stored on fixed or removable drives (hard drives,
floppy drives), and comparing those files against a database of known virus
"signatures". Some anti-virus programs are able to scan opened files in addition
to sent and received emails 'on the fly' in a similar manner. This practice is
known as "on-access scanning." Anti-virus software does not change the
underlying capability of host software to transmit viruses. Users must update
their software regularly to patch security holes. Anti-virus software also needs to
be regularly updated in order to gain knowledge about the latest threats.
RecoveRy methods
Once a computer has been compromised by a virus, it is usually unsafe to
continue using the same computer without completely reinstalling the
operating system. However, there are a number of recovery options that
exist after a computer has a virus. These actions depend on severity of the
type of virus.

opeRating system Reinstallation
As a last ditch effort, if a virus is on your system and anti-viral software can't
clean it, then reinstalling the operating system may be required. To do this
properly, the hard drive is completely erased (partition deleted and formatted)
and the operating system is installed from media known not to be infected.
Important files should first be backed up, if possible, and separately scanned
for infection before erasing the original hard drive and reinstalling the
operating system.
Illustration Of
Computer Viruses
I Love You
( Computer Virus )
www.google.com

www.wikipedia.com

Contenu connexe

Tendances

What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Virusesmartingarcia300
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 

Tendances (20)

What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 

En vedette

Praktikum 4 termoregulasi
Praktikum 4 termoregulasiPraktikum 4 termoregulasi
Praktikum 4 termoregulasiNana
 
Mendorong Pemerintah Bersih Dari Perusak Lingkungan
Mendorong Pemerintah Bersih Dari Perusak LingkunganMendorong Pemerintah Bersih Dari Perusak Lingkungan
Mendorong Pemerintah Bersih Dari Perusak Lingkungansonny dwi kristanu
 
Indonesia forest-moratorium-next-steps
Indonesia forest-moratorium-next-stepsIndonesia forest-moratorium-next-steps
Indonesia forest-moratorium-next-stepssonny dwi kristanu
 
The rise of the green and climate change 2
The rise of the green and climate change 2The rise of the green and climate change 2
The rise of the green and climate change 2sonny dwi kristanu
 
Transferencia de datos (buses)
Transferencia de datos (buses)Transferencia de datos (buses)
Transferencia de datos (buses)jodete culero
 
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)Perkembangan dan Tantangan (Gs redd+ unas_080713_final)
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)sonny dwi kristanu
 
Laporan darah
Laporan darahLaporan darah
Laporan darahNana
 
Mekanisme partisipasi publik sda
Mekanisme partisipasi publik sdaMekanisme partisipasi publik sda
Mekanisme partisipasi publik sdasonny dwi kristanu
 
Budidaya tiram mutiara
Budidaya tiram mutiaraBudidaya tiram mutiara
Budidaya tiram mutiaraNana
 
Genetika populasi
Genetika populasiGenetika populasi
Genetika populasiNana
 

En vedette (15)

Yolanda (pwp)
Yolanda (pwp)Yolanda (pwp)
Yolanda (pwp)
 
Praktikum 4 termoregulasi
Praktikum 4 termoregulasiPraktikum 4 termoregulasi
Praktikum 4 termoregulasi
 
Redd+ ugm 010913_final
Redd+ ugm 010913_finalRedd+ ugm 010913_final
Redd+ ugm 010913_final
 
Mendorong Pemerintah Bersih Dari Perusak Lingkungan
Mendorong Pemerintah Bersih Dari Perusak LingkunganMendorong Pemerintah Bersih Dari Perusak Lingkungan
Mendorong Pemerintah Bersih Dari Perusak Lingkungan
 
Techfa General Catalog
Techfa General CatalogTechfa General Catalog
Techfa General Catalog
 
Pemerintahan bersih walhi
Pemerintahan bersih walhiPemerintahan bersih walhi
Pemerintahan bersih walhi
 
Indonesia forest-moratorium-next-steps
Indonesia forest-moratorium-next-stepsIndonesia forest-moratorium-next-steps
Indonesia forest-moratorium-next-steps
 
The rise of the green and climate change 2
The rise of the green and climate change 2The rise of the green and climate change 2
The rise of the green and climate change 2
 
Transferencia de datos (buses)
Transferencia de datos (buses)Transferencia de datos (buses)
Transferencia de datos (buses)
 
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)Perkembangan dan Tantangan (Gs redd+ unas_080713_final)
Perkembangan dan Tantangan (Gs redd+ unas_080713_final)
 
One map participatory
One map participatoryOne map participatory
One map participatory
 
Laporan darah
Laporan darahLaporan darah
Laporan darah
 
Mekanisme partisipasi publik sda
Mekanisme partisipasi publik sdaMekanisme partisipasi publik sda
Mekanisme partisipasi publik sda
 
Budidaya tiram mutiara
Budidaya tiram mutiaraBudidaya tiram mutiara
Budidaya tiram mutiara
 
Genetika populasi
Genetika populasiGenetika populasi
Genetika populasi
 

Similaire à Presentation24190

Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 

Similaire à Presentation24190 (20)

Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computervirus
ComputervirusComputervirus
Computervirus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Presentation24190

  • 1.
  • 2. Topic of discussion Description of topic Example of use Importance to know about this topics Suggestion to use it OR Steps to avoid it (choose which is appropriate to your topics) Source of Reference
  • 3. INTRODUCTION A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host.
  • 4. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. In the context of computer software, a Trojan horse is a program that installs malicious software while under the guise of doing something else. A Trojan horse differs from a virus in that a Trojan horse does not insert its code into other computer files and appears harmless until executed. The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. (See Social engineering.) Often the term is shortened to simply Trojan. There are two common types of Trojan horses. One is ordinary software that has been corrupted by a hacker. A hacker inserts malicious code into the program that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer-to-peer file sharing utilities. The other type of Trojan is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into running the program.
  • 5. Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if Trojans replicate and distribute themselves, each new victim must run the Trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system's security design or configuration. In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow Kernel Code to access anything for which it is not authorized.
  • 6. Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss. There are many viruses operating in the general Internet today, and new ones are created and discovered every day.
  • 7. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.
  • 8. The role of software development Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit software bugs in a system or application to spread. Software development strategies that produce large numbers of bugs will generally also produce potential exploits.
  • 9. Anti-virus software and other preventive countermeasures There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The disadvantage of this detection method is that users are only protected from viruses that pre-date their last virus definition update. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms’ have yet to create a signature for. Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. Users must update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats.
  • 10. RecoveRy methods Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus. opeRating system Reinstallation As a last ditch effort, if a virus is on your system and anti-viral software can't clean it, then reinstalling the operating system may be required. To do this properly, the hard drive is completely erased (partition deleted and formatted) and the operating system is installed from media known not to be infected. Important files should first be backed up, if possible, and separately scanned for infection before erasing the original hard drive and reinstalling the operating system.
  • 11. Illustration Of Computer Viruses I Love You ( Computer Virus )