SlideShare une entreprise Scribd logo
1  sur  21
Introduction 
 Computer virus have become today’s 
headline news. 
 With the increasing use of the internet, it 
has become easier for virus to spread. 
 Virus show us loopholes in software. 
 Most virus are targeted at the MS 
Windows OS.
What is a Virus ? 
 A virus is just a computer program. Like any 
other program, it contains instructions that 
tell your computer what to do. 
 But unlike an application, a virus usually 
tells your computer to do something you 
don't want it to do, and it can usually spread 
itself to other files on your computer -- and 
other people's computers.
 In some cases, a virus will execute only a 
gentle "personality quirk," such as causing 
your computer to make seemingly random 
bleeps. 
 But a virus can be very destructive; it could 
format your hard drive, overwrite your hard 
drive boot sector, or delete files and render 
your machine inoperable.
History of Viruses 
 As time progressed many other types of viruses 
were developed. 
 In 1992, four students at Cornell University 
created the MBDF virus. 
 This virus attacked Apple Macintosh 
computers. 
 The virus was released in three shareware 
programs: Obnoxious Tetris (computer game), 
Ten Tile Puzzle (computer game), and Tetris 
cycle (Trojan Horse program). 
 This virus was benign, but the perpetrators 
were severely punished.
General virus types 
 Boot Sector Virus 
 Macro Virus 
 Multipartite Virus 
 Polymorphic Virus 
 Worms 
 Trojan horses 
 E-mail viruses 
 Stealth Virus
How They Spread ? 
 Early viruses were pieces of code attached to 
a common program like a popular game or a 
popular word processor. 
 A person might download an infected game 
from the internet or copy it from a floppy 
disk and run it. 
 A virus like this is a small piece of code 
embedded in a larger, legitimate program. 
Any virus is designed to run first when the 
legitimate program gets executed.
 If one of the infected programs is given to 
another person on a floppy disk, or if it is 
uploaded to internet, then other programs get 
infected. 
 This is how the virus spreads.
The impact of viruses 
 ICSA Labs estimates that the cost of a 
virus disaster is between $50,000 and 
$500,000 
 Average server downtime for a virus 
is 14 hours
The impact of viruses
Examples of risky file types 
 The following file types should never be 
opened: 
 .EXE 
 .PIF 
 .BAT 
 .VBS 
 .COM
TOP 5 Viruses Reported 
14 
12 
10 
8 
6 
4 
2 
0 
W32/klez/h W32- 
Bugbear-A 
Percent Reported to 
Sophos 2003 
W32/ElKern- 
C
Symptoms of Virus Attack 
 Computer no longer boots up. 
 Screen sometimes flicker. 
 Computer runs slower then usual. 
 PC speaker beeps periodically. 
 System crashes for no reason. 
 Files/directories sometimes disappear. 
 Denial of service (dos)….. & Many More.
Prevention is the best cure 
 Run a secure operating system like 
UNIX or Windows NT. 
 Install virus protection software. 
 Avoid programs from unknown 
sources. 
 Disable floppy disk booting
 Macro Virus Protection is enabled in all 
Microsoft applications. 
 Never double-click on an attachment that 
contains an executable that arrives as an 
e-mail attachment.
Protect Yourself from Computer Viruses 
 AVIEN & AVI-EWS 
 CERT 
 STOPzilla 
 GFI Mail Security for 
Exchange 
 Anti Virus eScan 2003 
 CIAC 
 Cyber notes 
 ICSA 
 Information Security 
Magazine 
 NIPC (National 
Infrastructure Protection 
Ctr) 
 SANS Institute 
 Virus Bulletin
How To Scan?
Anti-Virus Is Scanning
Finding Out A Virus
Top 9 Virus Protectors are... 
1) PANDA ANTIVIRUS PLATIINUM v7.0 
2) NORTON ANTIVIRUS 2003 
3) F-PROT FOR WINDOWS 
4) MCAFEE VIRUSSCAN HOME EDITION 
7.0 
5) NORMAN VIRUS CONTROL 
6) PC-CILLIN 
7) BIT DEFENDER PROFESSIONAL v6.5 
8) NOD 32 
9) STOPzilla!
Computer virus

Contenu connexe

Tendances

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 

Tendances (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 

En vedette (9)

As computer virus
As computer virusAs computer virus
As computer virus
 
Monday july 6 july 10,2015 epp lp
Monday                   july 6  july 10,2015 epp lpMonday                   july 6  july 10,2015 epp lp
Monday july 6 july 10,2015 epp lp
 
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictIct lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
 
Malware
MalwareMalware
Malware
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Malware
MalwareMalware
Malware
 
Pagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayariPagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayari
 
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
 
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusIct lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
 

Similaire à Computer virus

Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 

Similaire à Computer virus (20)

Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus.pptx
Computer Virus.pptxComputer Virus.pptx
Computer Virus.pptx
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Plus de Shailendra Gohil (6)

Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
Xml
Xml Xml
Xml
 
Features Of Office 2007
Features Of Office 2007Features Of Office 2007
Features Of Office 2007
 
Cng as alternate to gasoline
Cng as alternate to gasolineCng as alternate to gasoline
Cng as alternate to gasoline
 
Document authentication system with graphical security and sound
Document authentication system with graphical security and soundDocument authentication system with graphical security and sound
Document authentication system with graphical security and sound
 
History of orkut
History of orkutHistory of orkut
History of orkut
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Computer virus

  • 1.
  • 2. Introduction  Computer virus have become today’s headline news.  With the increasing use of the internet, it has become easier for virus to spread.  Virus show us loopholes in software.  Most virus are targeted at the MS Windows OS.
  • 3. What is a Virus ?  A virus is just a computer program. Like any other program, it contains instructions that tell your computer what to do.  But unlike an application, a virus usually tells your computer to do something you don't want it to do, and it can usually spread itself to other files on your computer -- and other people's computers.
  • 4.  In some cases, a virus will execute only a gentle "personality quirk," such as causing your computer to make seemingly random bleeps.  But a virus can be very destructive; it could format your hard drive, overwrite your hard drive boot sector, or delete files and render your machine inoperable.
  • 5. History of Viruses  As time progressed many other types of viruses were developed.  In 1992, four students at Cornell University created the MBDF virus.  This virus attacked Apple Macintosh computers.  The virus was released in three shareware programs: Obnoxious Tetris (computer game), Ten Tile Puzzle (computer game), and Tetris cycle (Trojan Horse program).  This virus was benign, but the perpetrators were severely punished.
  • 6. General virus types  Boot Sector Virus  Macro Virus  Multipartite Virus  Polymorphic Virus  Worms  Trojan horses  E-mail viruses  Stealth Virus
  • 7. How They Spread ?  Early viruses were pieces of code attached to a common program like a popular game or a popular word processor.  A person might download an infected game from the internet or copy it from a floppy disk and run it.  A virus like this is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed.
  • 8.  If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to internet, then other programs get infected.  This is how the virus spreads.
  • 9. The impact of viruses  ICSA Labs estimates that the cost of a virus disaster is between $50,000 and $500,000  Average server downtime for a virus is 14 hours
  • 10. The impact of viruses
  • 11. Examples of risky file types  The following file types should never be opened:  .EXE  .PIF  .BAT  .VBS  .COM
  • 12. TOP 5 Viruses Reported 14 12 10 8 6 4 2 0 W32/klez/h W32- Bugbear-A Percent Reported to Sophos 2003 W32/ElKern- C
  • 13. Symptoms of Virus Attack  Computer no longer boots up.  Screen sometimes flicker.  Computer runs slower then usual.  PC speaker beeps periodically.  System crashes for no reason.  Files/directories sometimes disappear.  Denial of service (dos)….. & Many More.
  • 14. Prevention is the best cure  Run a secure operating system like UNIX or Windows NT.  Install virus protection software.  Avoid programs from unknown sources.  Disable floppy disk booting
  • 15.  Macro Virus Protection is enabled in all Microsoft applications.  Never double-click on an attachment that contains an executable that arrives as an e-mail attachment.
  • 16. Protect Yourself from Computer Viruses  AVIEN & AVI-EWS  CERT  STOPzilla  GFI Mail Security for Exchange  Anti Virus eScan 2003  CIAC  Cyber notes  ICSA  Information Security Magazine  NIPC (National Infrastructure Protection Ctr)  SANS Institute  Virus Bulletin
  • 19. Finding Out A Virus
  • 20. Top 9 Virus Protectors are... 1) PANDA ANTIVIRUS PLATIINUM v7.0 2) NORTON ANTIVIRUS 2003 3) F-PROT FOR WINDOWS 4) MCAFEE VIRUSSCAN HOME EDITION 7.0 5) NORMAN VIRUS CONTROL 6) PC-CILLIN 7) BIT DEFENDER PROFESSIONAL v6.5 8) NOD 32 9) STOPzilla!