SlideShare une entreprise Scribd logo
1  sur  14
Computer VirusesComputer Viruses
NAME:- NISHANAME:- NISHA
CLASS :-9BCLASS :-9B
ROLL NO.:-24ROLL NO.:-24
Definition of VirusDefinition of Virus
 A virus is a small piece of software thatA virus is a small piece of software that
piggybacks on real programs in order to getpiggybacks on real programs in order to get
executedexecuted
 Once itOnce it’’s running, it spreads by insertings running, it spreads by inserting
copies of itself into other executable code orcopies of itself into other executable code or
documentsdocuments
Computer Virus TimelineComputer Virus Timeline
 19491949
Theories for self-replicating programs are first developed.Theories for self-replicating programs are first developed.
 19811981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found onApple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on
the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
 19831983
Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computerFred Cohen, while working on his dissertation, formally defines a computer virus as “a computer
program that can affect other computer programs by modifying them in such a way as to include aprogram that can affect other computer programs by modifying them in such a way as to include a
(possibly evolved) copy of itself.”(possibly evolved) copy of itself.”
 19861986
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppyTwo programmers named Basit and Amjad replace the executable code in the boot sector of a floppy
disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppiesdisk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies
had “© Brain” for a volume label.had “© Brain” for a volume label.
 19871987
The Lehigh virus, one of the first file viruses, infects command.com files.The Lehigh virus, one of the first file viruses, infects command.com files.
 19881988
One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virusOne of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus
affects both .exe and .com files and deletes any programs run on that day.affects both .exe and .com files and deletes any programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.MacMag and the Scores virus cause the first major Macintosh outbreaks.
 ……
Typical things that some currentTypical things that some current
Personal Computer (PC) viruses doPersonal Computer (PC) viruses do
 Display a messageDisplay a message
Typical things that some currentTypical things that some current
Personal Computer (PC) viruses doPersonal Computer (PC) viruses do
 Erase filesErase files
 Scramble data on a hard diskScramble data on a hard disk
 Cause erratic screen behaviorCause erratic screen behavior
 Halt the PCHalt the PC
 Many viruses do nothing obvious at allMany viruses do nothing obvious at all
except spread!except spread!
 Display a messageDisplay a message
Distributed Denial of ServiceDistributed Denial of Service
 AA denial-of-service attackdenial-of-service attack is an attack thatis an attack that
causes a loss of service to users, typicallycauses a loss of service to users, typically
the loss of network connectivity andthe loss of network connectivity and
services by consuming the bandwidth of theservices by consuming the bandwidth of the
victim network or overloading thevictim network or overloading the
computational resources of the victimcomputational resources of the victim
system.system.
How it works?How it works?
 The flood of incoming messages to the targetThe flood of incoming messages to the target
system essentially forces it to shut down, therebysystem essentially forces it to shut down, thereby
denying service to the system to legitimate users.denying service to the system to legitimate users.
 Victim's IP address.Victim's IP address.
 Victim's port number.Victim's port number.
 Attacking packet size.Attacking packet size.
 Attacking interpacket delay.Attacking interpacket delay.
 Duration of attack.Duration of attack.
 MyDoom – SCO GroupMyDoom – SCO Group
Executable VirusesExecutable Viruses
 Traditional VirusesTraditional Viruses
 pieces of code attached to a legitimatepieces of code attached to a legitimate
programprogram
 run when the legitimate program getsrun when the legitimate program gets
executedexecuted
 loads itself into memory and looks aroundloads itself into memory and looks around
to see if it can find any other programs onto see if it can find any other programs on
the diskthe disk
Boot Sector VirusesBoot Sector Viruses
 Traditional VirusTraditional Virus
 infect the boot sector on floppy disks andinfect the boot sector on floppy disks and
hard diskshard disks
 By putting its code in the boot sector, aBy putting its code in the boot sector, a
virus can guarantee it gets executedvirus can guarantee it gets executed
 load itself into memory immediately, and itload itself into memory immediately, and it
is able to run whenever the computer is onis able to run whenever the computer is on
Decline of traditional virusesDecline of traditional viruses
 Reasons:Reasons:
– Huge size of today’s programs storing on aHuge size of today’s programs storing on a
compact diskcompact disk
– Operating systmes now protect the boot sectorOperating systmes now protect the boot sector
E-mail VirusesE-mail Viruses
 Moves around in e-mail messagesMoves around in e-mail messages
 Replicates itself by automatically mailingReplicates itself by automatically mailing
itself to dozens of people in the victimitself to dozens of people in the victim’’s e-s e-
mail address bookmail address book
 Example:Example: Melissa virusMelissa virus,, ILOVEYOU virusILOVEYOU virus
Melissa virusMelissa virus
 March 1999March 1999
 the Melissa virus was the fastest-spreading virusthe Melissa virus was the fastest-spreading virus
ever seenever seen
 Someone created the virus as a Word documentSomeone created the virus as a Word document
uploaded to anuploaded to an Internet newsgroupInternet newsgroup
 People who downloaded the document and openedPeople who downloaded the document and opened
it would trigger the virusit would trigger the virus
 The virus would then send the document in an e-The virus would then send the document in an e-
mail message to the first 50 people in the person'smail message to the first 50 people in the person's
address bookaddress book
PreventionPrevention
 UpdatesUpdates
 Anti-VirusesAnti-Viruses
 More secure operating systemsMore secure operating systems
e.g. UNIXe.g. UNIX
Computer virus

Contenu connexe

Tendances

What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 

Tendances (20)

Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
computer virus
computer viruscomputer virus
computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 

En vedette

Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 

En vedette (13)

Computer virus
Computer virus Computer virus
Computer virus
 
1
11
1
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 

Similaire à Computer virus (20)

Computer virus
Computer virusComputer virus
Computer virus
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
computer-viruses
computer-virusescomputer-viruses
computer-viruses
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finale
 
Viruses
VirusesViruses
Viruses
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 

Computer virus

  • 1. Computer VirusesComputer Viruses NAME:- NISHANAME:- NISHA CLASS :-9BCLASS :-9B ROLL NO.:-24ROLL NO.:-24
  • 2. Definition of VirusDefinition of Virus  A virus is a small piece of software thatA virus is a small piece of software that piggybacks on real programs in order to getpiggybacks on real programs in order to get executedexecuted  Once itOnce it’’s running, it spreads by insertings running, it spreads by inserting copies of itself into other executable code orcopies of itself into other executable code or documentsdocuments
  • 3. Computer Virus TimelineComputer Virus Timeline  19491949 Theories for self-replicating programs are first developed.Theories for self-replicating programs are first developed.  19811981 Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found onApple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.  19831983 Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computerFred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include aprogram that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.”(possibly evolved) copy of itself.”  19861986 Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppyTwo programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppiesdisk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label.had “© Brain” for a volume label.  19871987 The Lehigh virus, one of the first file viruses, infects command.com files.The Lehigh virus, one of the first file viruses, infects command.com files.  19881988 One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virusOne of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day.affects both .exe and .com files and deletes any programs run on that day. MacMag and the Scores virus cause the first major Macintosh outbreaks.MacMag and the Scores virus cause the first major Macintosh outbreaks.  ……
  • 4. Typical things that some currentTypical things that some current Personal Computer (PC) viruses doPersonal Computer (PC) viruses do  Display a messageDisplay a message
  • 5. Typical things that some currentTypical things that some current Personal Computer (PC) viruses doPersonal Computer (PC) viruses do  Erase filesErase files  Scramble data on a hard diskScramble data on a hard disk  Cause erratic screen behaviorCause erratic screen behavior  Halt the PCHalt the PC  Many viruses do nothing obvious at allMany viruses do nothing obvious at all except spread!except spread!  Display a messageDisplay a message
  • 6. Distributed Denial of ServiceDistributed Denial of Service  AA denial-of-service attackdenial-of-service attack is an attack thatis an attack that causes a loss of service to users, typicallycauses a loss of service to users, typically the loss of network connectivity andthe loss of network connectivity and services by consuming the bandwidth of theservices by consuming the bandwidth of the victim network or overloading thevictim network or overloading the computational resources of the victimcomputational resources of the victim system.system.
  • 7. How it works?How it works?  The flood of incoming messages to the targetThe flood of incoming messages to the target system essentially forces it to shut down, therebysystem essentially forces it to shut down, thereby denying service to the system to legitimate users.denying service to the system to legitimate users.  Victim's IP address.Victim's IP address.  Victim's port number.Victim's port number.  Attacking packet size.Attacking packet size.  Attacking interpacket delay.Attacking interpacket delay.  Duration of attack.Duration of attack.  MyDoom – SCO GroupMyDoom – SCO Group
  • 8. Executable VirusesExecutable Viruses  Traditional VirusesTraditional Viruses  pieces of code attached to a legitimatepieces of code attached to a legitimate programprogram  run when the legitimate program getsrun when the legitimate program gets executedexecuted  loads itself into memory and looks aroundloads itself into memory and looks around to see if it can find any other programs onto see if it can find any other programs on the diskthe disk
  • 9. Boot Sector VirusesBoot Sector Viruses  Traditional VirusTraditional Virus  infect the boot sector on floppy disks andinfect the boot sector on floppy disks and hard diskshard disks  By putting its code in the boot sector, aBy putting its code in the boot sector, a virus can guarantee it gets executedvirus can guarantee it gets executed  load itself into memory immediately, and itload itself into memory immediately, and it is able to run whenever the computer is onis able to run whenever the computer is on
  • 10. Decline of traditional virusesDecline of traditional viruses  Reasons:Reasons: – Huge size of today’s programs storing on aHuge size of today’s programs storing on a compact diskcompact disk – Operating systmes now protect the boot sectorOperating systmes now protect the boot sector
  • 11. E-mail VirusesE-mail Viruses  Moves around in e-mail messagesMoves around in e-mail messages  Replicates itself by automatically mailingReplicates itself by automatically mailing itself to dozens of people in the victimitself to dozens of people in the victim’’s e-s e- mail address bookmail address book  Example:Example: Melissa virusMelissa virus,, ILOVEYOU virusILOVEYOU virus
  • 12. Melissa virusMelissa virus  March 1999March 1999  the Melissa virus was the fastest-spreading virusthe Melissa virus was the fastest-spreading virus ever seenever seen  Someone created the virus as a Word documentSomeone created the virus as a Word document uploaded to anuploaded to an Internet newsgroupInternet newsgroup  People who downloaded the document and openedPeople who downloaded the document and opened it would trigger the virusit would trigger the virus  The virus would then send the document in an e-The virus would then send the document in an e- mail message to the first 50 people in the person'smail message to the first 50 people in the person's address bookaddress book
  • 13. PreventionPrevention  UpdatesUpdates  Anti-VirusesAnti-Viruses  More secure operating systemsMore secure operating systems e.g. UNIXe.g. UNIX