SlideShare une entreprise Scribd logo
1  sur  16
Overview
Meaning
History
How do we get viruses ?
Effects of computer viruses
Types of computer infections
Keeping computer virus free
Anti-viruses
Some facts
Conclusion
Meaning
• A computer virus is a program or piece of code that is loaded onto
your computer without your knowledge and runs against your
wishes. Viruses can also replicate themselves. All computer viruses
are man-made. A simple virus that can make a copy of itself over
and over again is relatively easy to produce. Even such a simple
virus is dangerous because it will quickly use all available memory
and bring the system to a halt. An even more dangerous type of
virus is one capable of transmitting itself across networks and
bypassing security systems.
History…
• The Creeper virus was first detected on ARPANET, the forerunner
of the Internet, in the early 1970s.
• Creeper was an experimental self-replicating program written by
Bob Thomas at BBN Technologies in 1971.
• Creeper used the ARPANET to infect DEC PDP-10 computers
running the TENEX operating system.
• Creeper gained access via the ARPANET and copied itself to the
remote system where the message, "I'm the creeper, catch me if
you can!" was displayed. The Reaper program was created to
delete Creeper.
How Do We Get Viruses ?






Sharing music, files or photos with other users
Visiting an infected Web site
Opening spam email or an email attachment
Downloading free games, toolbars, media players and other
system utilities
Installing mainstream software applications without fully
reading license agreements
Effects of Viruses
Slow computer performance
Erratic computer behavior
Unexplained data loss
Frequent computer crashes
Sapping computer memory
 Files/Directories disappear
 Denial of service
Types of Computer Infection

Viruses
Meaning….
Trojans

Viruses

Worms

Those on the receiving end
of a Trojan Horse are
usually tricked into opening
them because they appear
to be receiving legitimate
software or files from a
legitimate source.

Like a human virus, a
computer virus can range in
severity: some may cause
only mildly annoying effects
while others can damage
your hardware, software or
files

Worms spread from
computer to computer, but
unlike a virus, it has the
capability to travel without
any human action
Keeping Computer Virus Free
• Install anti-virus software from a reputable vendor. Update it and use it
regularly.
• In addition to scanning for viruses on a regular basis, install an "on
access" scanner (included in most anti-virus software packages) and
configure it to start each time you start up your computer. This will
protect your system by checking for viruses each time you run an
executable file.
• Use a virus scan before you open any new programs or files that may
contain executable code. This includes packaged software that you buy
from the store as well as any program you might download from the
Internet.
Keeping Computer Virus Free…
• If you are a member of an online community or chat room, be very
careful about accepting files or clicking links that you find or that
people send you within the community.
• Make sure you back up your data (documents, bookmark files,
important email messages, etc.) on disc so that in the event of a
virus infection, you do not lose valuable work.
• Scan all incoming email attachments
• The more computers flash cards, CDs, zip cards and floppies have
been used on, the better the chance of a virus infecting them –
clean them before use
Anti-viruses
• “Antivirus" is protective software designed to defend your
computer against malicious software. Malicious software, or
"malware" includes: viruses, Trojans, keyloggers, hijackers,
dialers, and other code that vandalizes or steals your computer
contents. In order to be an effective defense, your antivirus
software needs to run in the background at all times, and should
be kept updated so it recognizes new versions of malicious
software.
Some facts…
• Mydoom Virus in January 2004 infected almost 1 million computers
in as little as one day
• Melissa Virus in March 1999 was powerful enough to have Microsoft
and various other companies to shut down emailing systems until
the virus could finally be stopped.
• Storm Worm in January 2007 was said to have infected 50,000
computers by October of that year.
• Over 6,000 new computer viruses are released every month.
Some facts…
• The first virus that came into wild was elk cloner virus.This virus
was created by Richard Skrenta in 1981 when he was a student in
high school.He created it as a joke and inserted it in a game on a
floppy disk.The elk cloner virus get activated on its 50th use and
displays a poem "Elk Cloner: The program with a personality."
• Farooq Alvi Brothers of Lahore,Pakistan created the first pc virus
in 1986.It was a boot sector virus.
• The term virus to denote a self replicating program was first used
in 1969 in a short story of a Galaxy Magaine written by David
Gerrold.
Conclusion…
• I think with enough knowledge about viruses and the right kind of
software they can almost be preventable, you just have to use
common sense.
• Don’t open emails and download software that does not look like
it is from a reliable source
• Download Software that prevents and helps protect against
viruses
computer viruses

Contenu connexe

Tendances

Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?cnbweg45
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 

Tendances (20)

Computer worm
Computer wormComputer worm
Computer worm
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 

Similaire à computer viruses

Similaire à computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Malicious
MaliciousMalicious
Malicious
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

Dernier

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

computer viruses

  • 1.
  • 2. Overview Meaning History How do we get viruses ? Effects of computer viruses Types of computer infections Keeping computer virus free Anti-viruses Some facts Conclusion
  • 3. Meaning • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  • 4. History… • The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. • Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. • Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. • Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
  • 5. How Do We Get Viruses ?      Sharing music, files or photos with other users Visiting an infected Web site Opening spam email or an email attachment Downloading free games, toolbars, media players and other system utilities Installing mainstream software applications without fully reading license agreements
  • 6. Effects of Viruses Slow computer performance Erratic computer behavior Unexplained data loss Frequent computer crashes Sapping computer memory  Files/Directories disappear  Denial of service
  • 7. Types of Computer Infection Viruses
  • 8. Meaning…. Trojans Viruses Worms Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action
  • 9. Keeping Computer Virus Free • Install anti-virus software from a reputable vendor. Update it and use it regularly. • In addition to scanning for viruses on a regular basis, install an "on access" scanner (included in most anti-virus software packages) and configure it to start each time you start up your computer. This will protect your system by checking for viruses each time you run an executable file. • Use a virus scan before you open any new programs or files that may contain executable code. This includes packaged software that you buy from the store as well as any program you might download from the Internet.
  • 10. Keeping Computer Virus Free… • If you are a member of an online community or chat room, be very careful about accepting files or clicking links that you find or that people send you within the community. • Make sure you back up your data (documents, bookmark files, important email messages, etc.) on disc so that in the event of a virus infection, you do not lose valuable work. • Scan all incoming email attachments • The more computers flash cards, CDs, zip cards and floppies have been used on, the better the chance of a virus infecting them – clean them before use
  • 11. Anti-viruses • “Antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
  • 12.
  • 13. Some facts… • Mydoom Virus in January 2004 infected almost 1 million computers in as little as one day • Melissa Virus in March 1999 was powerful enough to have Microsoft and various other companies to shut down emailing systems until the virus could finally be stopped. • Storm Worm in January 2007 was said to have infected 50,000 computers by October of that year. • Over 6,000 new computer viruses are released every month.
  • 14. Some facts… • The first virus that came into wild was elk cloner virus.This virus was created by Richard Skrenta in 1981 when he was a student in high school.He created it as a joke and inserted it in a game on a floppy disk.The elk cloner virus get activated on its 50th use and displays a poem "Elk Cloner: The program with a personality." • Farooq Alvi Brothers of Lahore,Pakistan created the first pc virus in 1986.It was a boot sector virus. • The term virus to denote a self replicating program was first used in 1969 in a short story of a Galaxy Magaine written by David Gerrold.
  • 15. Conclusion… • I think with enough knowledge about viruses and the right kind of software they can almost be preventable, you just have to use common sense. • Don’t open emails and download software that does not look like it is from a reliable source • Download Software that prevents and helps protect against viruses