SlideShare une entreprise Scribd logo
1  sur  15
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
A computer virus is a caustic computer
program that can replicate itself and spread from
one computer to another without the permission of
the owner.




       © 2012 Charmaine S. Camilo. All rights
                   reserved.
Viruses




  Botnet                   Malware       Worms




                             Trojan
                             Horse

© 2012 Charmaine S. Camilo. All rights
            reserved.
•   Worms
•   Boot sector virus
•   File infection virus
•   Multipartite virus
•   Network virus
•   E-mail virus
•   Macro virus
•   Memory resident viruses
•   Root kit virus
•   Polymorphic viruses
•   Logic bombs/Time bombs


         © 2012 Charmaine S. Camilo. All rights
                     reserved.
The following are some possible indications
    that a computer has been infected by a virus.
    These problems can also be caused by non-virus
    problems, but they are the most reported
    symptoms of a computer virus infection.

•   Computer no longer boots up.
•   Screens sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.

         © 2012 Charmaine S. Camilo. All rights
                     reserved.
Virus writers have to balance how and when
  their viruses infect against the possibility of being
  detected. Therefore, the spread of an infection
  may not be immediate.

Phases of Viruses
• Infection phase
• Attack phase




        © 2012 Charmaine S. Camilo. All rights
                    reserved.
•   System Sectors/Boot Records
•   Files
•   Companion Files
•   Macros
•   Disk Clusters
•   Batch Files
•   Source Code
•   Visual Basic Worms




         © 2012 Charmaine S. Camilo. All rights
                     reserved.
1. Email attachments.
2. Rogue Websites.
3. Networks
4. Infected Boot Disks
5. Phishing Schemes
6. Infected Software
7. Hackers
8. Instant Messaging
9. Fake Anti Virus Software
10. From Mobile Devices
11. Friends and Relatives

        © 2012 Charmaine S. Camilo. All rights
                    reserved.
• Anti-virus software
• Scan your computer on a regular basis
• Update your anti-virus software on a regular basis
• Back-up
• Turn-off E-mail Preview
• Scan Removable disk
• Scan downloaded files
• Scan all e-mail attachments
• Beware of e-mail attachments from unknown
  sources
• Be alert!


        © 2012 Charmaine S. Camilo. All rights
                    reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.

Contenu connexe

Tendances

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 

Tendances (20)

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Adware
AdwareAdware
Adware
 
Internet threat
Internet threatInternet threat
Internet threat
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Sowmya
SowmyaSowmya
Sowmya
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 

En vedette

Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Arvin Garing
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Charmaine Camilo
 
Chapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksChapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksJoanna Rose Saculo
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINAleahamper29
 
RIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADRIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADTon Mausisa
 
Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Charmaine Camilo
 
Article 2 Philippine Constitution
Article 2 Philippine ConstitutionArticle 2 Philippine Constitution
Article 2 Philippine Constitutioncristineyabes1
 
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Msphieebz Lazatin
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of RightsKostyk Elf
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaRUEL VILLASIS
 
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanJose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanAenn Charelle
 
Rizal's Life in Dapitan
Rizal's Life in DapitanRizal's Life in Dapitan
Rizal's Life in Dapitanquelz
 
Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Emilio Fer Villa
 
Socio5 13 la liga and exile in dapitan
Socio5   13 la liga and exile in dapitanSocio5   13 la liga and exile in dapitan
Socio5 13 la liga and exile in dapitanYvan Gumbao
 

En vedette (20)

Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)
 
Chapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksChapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and Works
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
 
RIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADRIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROAD
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
 
Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987
 
Article 2 Philippine Constitution
Article 2 Philippine ConstitutionArticle 2 Philippine Constitution
Article 2 Philippine Constitution
 
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of Rights
 
Introduction to WAN
Introduction to WANIntroduction to WAN
Introduction to WAN
 
Kabanata 25 rizal
Kabanata 25 rizalKabanata 25 rizal
Kabanata 25 rizal
 
Chapter 21-jpr
Chapter 21-jprChapter 21-jpr
Chapter 21-jpr
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga Filipina
 
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanJose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
 
Rizal's Life in Dapitan
Rizal's Life in DapitanRizal's Life in Dapitan
Rizal's Life in Dapitan
 
Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan
 
Socio5 13 la liga and exile in dapitan
Socio5   13 la liga and exile in dapitanSocio5   13 la liga and exile in dapitan
Socio5 13 la liga and exile in dapitan
 

Similaire à Computer Virus

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Malware and its types
Malware and its typesMalware and its types
Malware and its typesShouaQureshi
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-bBbAOC
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovEric Vanderburg
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
CYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxCYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxnarenr9
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisaDom Mike
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

Similaire à Computer Virus (20)

NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxCYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptx
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Plus de Charmaine Camilo

Plus de Charmaine Camilo (16)

GMO - Genetically Modified Organisms
GMO - Genetically Modified OrganismsGMO - Genetically Modified Organisms
GMO - Genetically Modified Organisms
 
Prehistoric Weapons
Prehistoric WeaponsPrehistoric Weapons
Prehistoric Weapons
 
This I Promise You - NSYNC
This I Promise You - NSYNCThis I Promise You - NSYNC
This I Promise You - NSYNC
 
All About Ears
All About EarsAll About Ears
All About Ears
 
Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)
 
Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)
 
Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)
 
Barriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic CultureBarriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic Culture
 
Recommendations
RecommendationsRecommendations
Recommendations
 
Socioanthro report cellona
Socioanthro report cellonaSocioanthro report cellona
Socioanthro report cellona
 
Bridges
BridgesBridges
Bridges
 
Growth of A Democratic Culture
Growth of A Democratic CultureGrowth of A Democratic Culture
Growth of A Democratic Culture
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 

Dernier

Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 

Dernier (20)

Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 

Computer Virus

  • 1. © 2012 Charmaine S. Camilo. All rights reserved.
  • 2. © 2012 Charmaine S. Camilo. All rights reserved.
  • 3. © 2012 Charmaine S. Camilo. All rights reserved.
  • 4. © 2012 Charmaine S. Camilo. All rights reserved.
  • 5. © 2012 Charmaine S. Camilo. All rights reserved.
  • 6. A computer virus is a caustic computer program that can replicate itself and spread from one computer to another without the permission of the owner. © 2012 Charmaine S. Camilo. All rights reserved.
  • 7. Viruses Botnet Malware Worms Trojan Horse © 2012 Charmaine S. Camilo. All rights reserved.
  • 8. Worms • Boot sector virus • File infection virus • Multipartite virus • Network virus • E-mail virus • Macro virus • Memory resident viruses • Root kit virus • Polymorphic viruses • Logic bombs/Time bombs © 2012 Charmaine S. Camilo. All rights reserved.
  • 9. The following are some possible indications that a computer has been infected by a virus. These problems can also be caused by non-virus problems, but they are the most reported symptoms of a computer virus infection. • Computer no longer boots up. • Screens sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. © 2012 Charmaine S. Camilo. All rights reserved.
  • 10. Virus writers have to balance how and when their viruses infect against the possibility of being detected. Therefore, the spread of an infection may not be immediate. Phases of Viruses • Infection phase • Attack phase © 2012 Charmaine S. Camilo. All rights reserved.
  • 11. System Sectors/Boot Records • Files • Companion Files • Macros • Disk Clusters • Batch Files • Source Code • Visual Basic Worms © 2012 Charmaine S. Camilo. All rights reserved.
  • 12. 1. Email attachments. 2. Rogue Websites. 3. Networks 4. Infected Boot Disks 5. Phishing Schemes 6. Infected Software 7. Hackers 8. Instant Messaging 9. Fake Anti Virus Software 10. From Mobile Devices 11. Friends and Relatives © 2012 Charmaine S. Camilo. All rights reserved.
  • 13. • Anti-virus software • Scan your computer on a regular basis • Update your anti-virus software on a regular basis • Back-up • Turn-off E-mail Preview • Scan Removable disk • Scan downloaded files • Scan all e-mail attachments • Beware of e-mail attachments from unknown sources • Be alert! © 2012 Charmaine S. Camilo. All rights reserved.
  • 14. © 2012 Charmaine S. Camilo. All rights reserved.
  • 15. © 2012 Charmaine S. Camilo. All rights reserved.