SlideShare une entreprise Scribd logo
1  sur  31
Computer Virus ArnabSingha, VI CSE VipinBorkar, VI CSE 1
What is a Computer Virus A kind of software programs produced by unknown people and harmful to the computers Some varieties of these software are the Viruses, WormsandTrojan horses 2
What is a Computer Virus The term “Virus" is often used in common to describe all kinds of malware (malicious software) 3
Damages done by Viruses Sometimes display unwanted messages Some tend to destroy programs or data  Clog computer memory and hence sometimes result in system crashes Format hard disks, Damage programs, Delete files 4 Viruses
Damages done by Viruses Simply replicate themselves  Presents text, video, or audio messages making the user know their presence Bug-ridden, and these bugs may lead to system crashes and data loss 5
Virus spreading methods A viruses can copy itself and infect a computer  without permission or knowledge of the user attaches itself to other software programs or data files 6
Virus spreading methods Spreads from computer to computer when the host is taken to the uninfected computer over a network  such as over the Internet or carrying it on a removable medium - a floppy disk, CD, or USB drive 7
Virus spreading methods Many viruses are existed in the Internet today and new ones are discovered every day.  spread via downloaded software and data files, and email attachments, etc 8
Virus spreading methods Some old viruses are installed themselves into the disk boot sector runs when the user boot the computer from the disk 9
Virus spreading methods Some viruses spread through instant messaging A virus, in an infected machine, may send a web-address-link as a message to other contacting machines Thinking the link is from a friend (a trusted source), the recipient may sometimes follow the link to the websit. 10
How Viruses are born Unlike biological viruses, computer viruses do not simply evolve by themselves deliberately created by programmers, or by people who use virus creation software 11
How Viruses are borne Viruses are written as research projects, pranks, vandalism,  to attack the products of specific companies,  to distribute political messages,  and financial gain from identity theft,  spyware, and cryptoviral extortion.  12
How Viruses are borne Some virus writers  consider their creations to be works of art See virus writing as a creative hobby 13 Releasing computer viruses is a crime in most jurisdictions
Viruses can avoid detection To avoid detection by users, viruses employ different deception methods They do not make themselves to change the date of last modified increase file sizes  damage the files 14
Viruses can avoid detection They kill the tasks associated with antivirus software before it can detect them 15
How Antivirus software works? Detect using a list of virus signature definitions comparing the files stored on fixed or removable drives (hard drives, floppy drives), against a database of known virus "signatures". 16
How Antivirus software works? Use a heuristic algorithm to find viruses based on common behaviors Examin the content heuristics of the computer's memory (its RAM, and boot sectors) 17
How Antivirus software works? Some anti-virus programs gives you a real time protection Examin files as they are being opened, downloaded, copied, accessed, and transmitted etc 18
How Antivirus software works? They need regular updates in order to gain knowledge about the latest threats 19
Damage prevention & data recovering Take regular backups (including OS) on different media, unconnected to the system (most of the time) 20 How to prevent damages caused by viruses?
Damage prevention & data recovering Use backups on optical media like CD and DVD (read-only), as they can no longer be affected by viruses.  Use an OS on a bootable, to start the computer if the installed OS become unusable. 21 How to prevent damages caused by viruses?
Keep your computer Virus free Install reliable anti-virus software the most important step you can take towards keeping your computer clean of viruses Update your anti-virus software regularly variations of viruses and new ones can be slipped if your software is not current 22
Keep your computer Virus free Get immediate protection Configure your anti-virus software to boot automatically on start-up and run at all times 23
Keep your computer Virus free ,[object Object]
ensure that you examine and scan email and other attachments before they run  as they might contain viruses
Scan all incoming email attachments
Do not open any email attached files if the subject line is questionable, unexpected or the source (address) is unknown, suspicious or untrustworthy  24
Keep your computer Virus free Delete chain emails and junk email Do not forward or reply to any of them, they clogs up the network  Some viruses can replicate themselves and spread through email  as a chain 25
Keep your computer Virus free Be careful when downloading files from the Internet Ensure that the source is a legitimate and reputable one save all downloads to one folder and test them with your own anti-virus software before use 26
Keep your computer Virus free Always scan new files for viruses before you use them 27
Keep your computer Virus free Backup your files on a regular basis 28

Contenu connexe

Tendances (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 

Similaire à COMPUTER VIRUS

Similaire à COMPUTER VIRUS (20)

virus
virusvirus
virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Dernier (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

COMPUTER VIRUS

  • 1. Computer Virus ArnabSingha, VI CSE VipinBorkar, VI CSE 1
  • 2. What is a Computer Virus A kind of software programs produced by unknown people and harmful to the computers Some varieties of these software are the Viruses, WormsandTrojan horses 2
  • 3. What is a Computer Virus The term “Virus" is often used in common to describe all kinds of malware (malicious software) 3
  • 4. Damages done by Viruses Sometimes display unwanted messages Some tend to destroy programs or data Clog computer memory and hence sometimes result in system crashes Format hard disks, Damage programs, Delete files 4 Viruses
  • 5. Damages done by Viruses Simply replicate themselves Presents text, video, or audio messages making the user know their presence Bug-ridden, and these bugs may lead to system crashes and data loss 5
  • 6. Virus spreading methods A viruses can copy itself and infect a computer without permission or knowledge of the user attaches itself to other software programs or data files 6
  • 7. Virus spreading methods Spreads from computer to computer when the host is taken to the uninfected computer over a network such as over the Internet or carrying it on a removable medium - a floppy disk, CD, or USB drive 7
  • 8. Virus spreading methods Many viruses are existed in the Internet today and new ones are discovered every day. spread via downloaded software and data files, and email attachments, etc 8
  • 9. Virus spreading methods Some old viruses are installed themselves into the disk boot sector runs when the user boot the computer from the disk 9
  • 10. Virus spreading methods Some viruses spread through instant messaging A virus, in an infected machine, may send a web-address-link as a message to other contacting machines Thinking the link is from a friend (a trusted source), the recipient may sometimes follow the link to the websit. 10
  • 11. How Viruses are born Unlike biological viruses, computer viruses do not simply evolve by themselves deliberately created by programmers, or by people who use virus creation software 11
  • 12. How Viruses are borne Viruses are written as research projects, pranks, vandalism, to attack the products of specific companies, to distribute political messages, and financial gain from identity theft, spyware, and cryptoviral extortion. 12
  • 13. How Viruses are borne Some virus writers consider their creations to be works of art See virus writing as a creative hobby 13 Releasing computer viruses is a crime in most jurisdictions
  • 14. Viruses can avoid detection To avoid detection by users, viruses employ different deception methods They do not make themselves to change the date of last modified increase file sizes damage the files 14
  • 15. Viruses can avoid detection They kill the tasks associated with antivirus software before it can detect them 15
  • 16. How Antivirus software works? Detect using a list of virus signature definitions comparing the files stored on fixed or removable drives (hard drives, floppy drives), against a database of known virus "signatures". 16
  • 17. How Antivirus software works? Use a heuristic algorithm to find viruses based on common behaviors Examin the content heuristics of the computer's memory (its RAM, and boot sectors) 17
  • 18. How Antivirus software works? Some anti-virus programs gives you a real time protection Examin files as they are being opened, downloaded, copied, accessed, and transmitted etc 18
  • 19. How Antivirus software works? They need regular updates in order to gain knowledge about the latest threats 19
  • 20. Damage prevention & data recovering Take regular backups (including OS) on different media, unconnected to the system (most of the time) 20 How to prevent damages caused by viruses?
  • 21. Damage prevention & data recovering Use backups on optical media like CD and DVD (read-only), as they can no longer be affected by viruses. Use an OS on a bootable, to start the computer if the installed OS become unusable. 21 How to prevent damages caused by viruses?
  • 22. Keep your computer Virus free Install reliable anti-virus software the most important step you can take towards keeping your computer clean of viruses Update your anti-virus software regularly variations of viruses and new ones can be slipped if your software is not current 22
  • 23. Keep your computer Virus free Get immediate protection Configure your anti-virus software to boot automatically on start-up and run at all times 23
  • 24.
  • 25. ensure that you examine and scan email and other attachments before they run as they might contain viruses
  • 26. Scan all incoming email attachments
  • 27. Do not open any email attached files if the subject line is questionable, unexpected or the source (address) is unknown, suspicious or untrustworthy 24
  • 28. Keep your computer Virus free Delete chain emails and junk email Do not forward or reply to any of them, they clogs up the network Some viruses can replicate themselves and spread through email as a chain 25
  • 29. Keep your computer Virus free Be careful when downloading files from the Internet Ensure that the source is a legitimate and reputable one save all downloads to one folder and test them with your own anti-virus software before use 26
  • 30. Keep your computer Virus free Always scan new files for viruses before you use them 27
  • 31. Keep your computer Virus free Backup your files on a regular basis 28
  • 32. Keep your computer Virus free If your computer is on a network, make sure you have security steps in place to prevent unauthorized users putting files on your computer 29
  • 33. Keep your computer Virus free Take care using USB flash cards, CDs, zip and floppy disks The more computers flash cards, CDs, zip cards and floppies have been used on, the better the chance of a virus infecting them – clean them before use 30
  • 34. THANK YOU 31