SlideShare uma empresa Scribd logo
1 de 10
DEFINITION OF VIRUS
 A virus is an infectious program which
  affects computer systems and data.
  Viruses are spread to any other programs
  they contact, thus being infectious. A virus
  will attach a copy of itself to an executable
  program.
 Usually attaches with .doc,.xls and exe
  extensions
TYPES OF VIRUS
 Worm
 Trapdoor
 Backdoor
 Trojan Horse
 Salami Attack
 Logic Bomb
 Internet time theft
TROJAN HORSE
 A program in which malicious or harmful code
  is contained inside apparently harmless
  programming or data.
 The software initially appears to perform a
  desirable function for the user prior to
  installation and/or execution.Trojan Horse
  attacks pose one of the most serious threats
  to computer security.
TYPES OF TROJAN HORSE
 Remote Access Trojan
 Data Sending Trojan
 Proxy Trojan
 Destructive Trojan
 FTP Trojan
 Denial-of-service attack(DoS)
SALAMI ATTACK
 A salami attack is a series of minor data-
  security attacks that together results in a
  larger attack.
 Crimes involving salami attacks typically are
  difficult to detect and trace.
 The salami technique can also refer to
  aggregating small amounts of information
  from                  many sources to derive an
  overall                   picture of an
  organization.
HOW TO COMBAT VIRUS
 Ensure that your operating system is up-
  to-date.
 Have an antivirus installed on your system
  and ensure you download updates
  frequently to ensure your software has the
  latest fixes for new viruses, worms, and
  Trojan horses.
 Install a firewall to prevents unauthorized
  use and access to your computer.
CONCLUSION
 Viruses are dangerous. You can maintain a
 relatively safe computer with a little bit of
 understanding and vigilance. Research any
 new viruses you hear about to make sure that
 the threat is real.
SOURCES
 http://www.support.psi.com/support/spart/virus.ht
    ml
   http://www.webopedia.com/DidYouKnow/Internet/
    2004/virus.asp
   http://virus-informati0n.blogspot.com/
   An Introduction To Keylogger, RATS And Malware
    written by Rafay Baloch
   Teacher’s Handouts:Introduction to Information
    and Communication Technology
Group Members:
Neville Quinn James(4F)
Muhd Saiful Nizam(4F)

Mais conteúdo relacionado

Mais procurados

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWAREWhiteHats
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
What is Ransomware? How To Prevent It
What is Ransomware? How To Prevent ItWhat is Ransomware? How To Prevent It
What is Ransomware? How To Prevent ItEricaMathew
 
Lec 2 introduction to the internet security
Lec 2 introduction to the internet securityLec 2 introduction to the internet security
Lec 2 introduction to the internet securityKewan Suliman
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24Muhammad Zain
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 

Mais procurados (20)

Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARETIPS TO PREVENT THE WANNA CRY RANSOMWARE
TIPS TO PREVENT THE WANNA CRY RANSOMWARE
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
What is Ransomware? How To Prevent It
What is Ransomware? How To Prevent ItWhat is Ransomware? How To Prevent It
What is Ransomware? How To Prevent It
 
Viruses
VirusesViruses
Viruses
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
TIC
TICTIC
TIC
 
Lec 2 introduction to the internet security
Lec 2 introduction to the internet securityLec 2 introduction to the internet security
Lec 2 introduction to the internet security
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Malware
MalwareMalware
Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Semelhante a VIRUS BY CHIRO

CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfKakai Catalan
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 

Semelhante a VIRUS BY CHIRO (20)

CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
MALWARE
MALWAREMALWARE
MALWARE
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Mitppt
MitpptMitppt
Mitppt
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
virus
virusvirus
virus
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
virus
  virus  virus
virus
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Cyber security
Cyber security Cyber security
Cyber security
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

VIRUS BY CHIRO

  • 1.
  • 2. DEFINITION OF VIRUS  A virus is an infectious program which affects computer systems and data. Viruses are spread to any other programs they contact, thus being infectious. A virus will attach a copy of itself to an executable program.  Usually attaches with .doc,.xls and exe extensions
  • 3. TYPES OF VIRUS  Worm  Trapdoor  Backdoor  Trojan Horse  Salami Attack  Logic Bomb  Internet time theft
  • 4. TROJAN HORSE  A program in which malicious or harmful code is contained inside apparently harmless programming or data.  The software initially appears to perform a desirable function for the user prior to installation and/or execution.Trojan Horse attacks pose one of the most serious threats to computer security.
  • 5. TYPES OF TROJAN HORSE  Remote Access Trojan  Data Sending Trojan  Proxy Trojan  Destructive Trojan  FTP Trojan  Denial-of-service attack(DoS)
  • 6. SALAMI ATTACK  A salami attack is a series of minor data- security attacks that together results in a larger attack.  Crimes involving salami attacks typically are difficult to detect and trace.  The salami technique can also refer to aggregating small amounts of information from many sources to derive an overall picture of an organization.
  • 7. HOW TO COMBAT VIRUS  Ensure that your operating system is up- to-date.  Have an antivirus installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses.  Install a firewall to prevents unauthorized use and access to your computer.
  • 8. CONCLUSION  Viruses are dangerous. You can maintain a relatively safe computer with a little bit of understanding and vigilance. Research any new viruses you hear about to make sure that the threat is real.
  • 9. SOURCES  http://www.support.psi.com/support/spart/virus.ht ml  http://www.webopedia.com/DidYouKnow/Internet/ 2004/virus.asp  http://virus-informati0n.blogspot.com/  An Introduction To Keylogger, RATS And Malware written by Rafay Baloch  Teacher’s Handouts:Introduction to Information and Communication Technology
  • 10. Group Members: Neville Quinn James(4F) Muhd Saiful Nizam(4F)