SlideShare uma empresa Scribd logo
1 de 10
Computer Viruses
         The Basics
What are Computer Viruses?
   Codes written by programmers
   Replicate within the host computer
   Spread via cyber-contact
       E-mail
       Downloads
       Networking
   Can be both malicious or benign
   Have the potential to cause serious damage
How do Computer Viruses
Spread?
   Opening infected e-mail attachments

   Accepting file transfers

   Trojan delivery

   Downloading infected programs or files from the
    internet, burned discs, USB flash drives, or other
    devices
How do Computer Viruses
Spread? (cont)
   Downloading or using pirated
    programs, images, movies,
    music, or other files that are
    infected

   Downloading programs that
    come with add-ons that contain
    viruses

   Infected Computer networks
What are the Symptoms?
   Unstable functioning of systems or programs

   Corrupted files and data

   Missing programs or files

   Appearance of unknown programs or files
What are the Symptoms? (cont)
   Fake anti-virus pop ups




           http://www.gamefreakzweb.com/2010_04_01_archive.html
What are the Symptoms? (cont)

   Missing desktop icons

   Operating system fails to boot

   Error messages

   Disk space full


http://blog.superuser.com/2012/02/17/wtfriday-what-happens-when-windows-runs-out-of-disk-space/
What are the Symptoms? (cont)

   Programs fail to launch

   Websites are redirected or blocked

   Genuine anti-virus company websites are blocked

   Slow PC speed
What are the Symptoms? (cont)
   Operating system crashes
    The Blue Screen of Death




          http://the-black-wolf-co-uk.deviantart.com/art/The-Blue-Screen-Saver-of-Death-47473826
Computer Viruses
                                         Works Cited

Blue Screen of Death. PNG. <http://the-black-wolf-co-uk.deviantart.com/art/The-Blue-Screen-
               Saver-of-Death-47473826>
Edison, George. disk_properties. PNG. <http://blog.superuser.com/2012/02/17/wtfriday-what-
               happens-when-windows-runs-out-of-disk-space/>
OCAL. Compact Disc 2. Rolera, LLC.PNG. < http://www.clker.com/>
OCAL. Computer Virus Character. Rolera, LLC.PNG. < http://www.clker.com/>
OCAL. Cassette Bones. Rolera, LLC.PNG. < http://www.clker.com/>
OCAL. Firefox. Rolera, LLC.JPG. < http://www.clker.com/>
OCAL. Mail Attachment. Rolera, LLC.PNG. < http://www.clker.com/>
OCAL. USB Thumbdrive. Rolera, LLC.PNG. < http://www.clker.com/>
Saadi. Search. Rolera, LLC.PNG. < http://www.clker.com/>
Tina. Example 1. Game FreakZ. PNG. <http://www.gamefreakzweb.com/
               2010_04_01_archive.html>
Tina. Example 3. Game FreakZ. PNG. <http://www.gamefreakzweb.com/
               2010_04_01_archive.html>

Mais conteúdo relacionado

Mais procurados

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESHARSORA_SEJAL
 
Virus And Anti Virus
Virus And Anti VirusVirus And Anti Virus
Virus And Anti Virusguest670ee0
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computerumesh patil
 

Mais procurados (8)

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
General ICT Troubleshooting
General ICT TroubleshootingGeneral ICT Troubleshooting
General ICT Troubleshooting
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
VIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSESVIRUSES AND ANTI-VIRUSES
VIRUSES AND ANTI-VIRUSES
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
Virus And Anti Virus
Virus And Anti VirusVirus And Anti Virus
Virus And Anti Virus
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computer
 

Destaque

Adjectives
AdjectivesAdjectives
Adjectivesjoneh20
 
Kahn josh advertising pp
Kahn josh advertising ppKahn josh advertising pp
Kahn josh advertising ppjoneh20
 
Alcuni Hilight sul mio lavoro
Alcuni Hilight sul mio lavoro Alcuni Hilight sul mio lavoro
Alcuni Hilight sul mio lavoro Camilla Orsini
 
The Internet Isn't Option for Your Christian Store
The Internet Isn't Option for Your Christian StoreThe Internet Isn't Option for Your Christian Store
The Internet Isn't Option for Your Christian Storeaquinasnmore
 

Destaque (6)

Causes of acne
Causes of acneCauses of acne
Causes of acne
 
Demo
DemoDemo
Demo
 
Adjectives
AdjectivesAdjectives
Adjectives
 
Kahn josh advertising pp
Kahn josh advertising ppKahn josh advertising pp
Kahn josh advertising pp
 
Alcuni Hilight sul mio lavoro
Alcuni Hilight sul mio lavoro Alcuni Hilight sul mio lavoro
Alcuni Hilight sul mio lavoro
 
The Internet Isn't Option for Your Christian Store
The Internet Isn't Option for Your Christian StoreThe Internet Isn't Option for Your Christian Store
The Internet Isn't Option for Your Christian Store
 

Semelhante a Computer viruses

Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptxAkshayIngole17
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computingcollimic
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingTech Day Camp
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Simplest way to remove Trojan virus
Simplest way to remove Trojan virusSimplest way to remove Trojan virus
Simplest way to remove Trojan virusremove-malware
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptxNaveenK432671
 
Computer viruses
Computer virusesComputer viruses
Computer virusessimron2002
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

Semelhante a Computer viruses (20)

Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Spn year8 notes
Spn year8 notesSpn year8 notes
Spn year8 notes
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computing
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Pc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshootingPc maintenance security backup and troubleshooting
Pc maintenance security backup and troubleshooting
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Simplest way to remove Trojan virus
Simplest way to remove Trojan virusSimplest way to remove Trojan virus
Simplest way to remove Trojan virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Último

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Último (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Computer viruses

  • 1. Computer Viruses The Basics
  • 2. What are Computer Viruses?  Codes written by programmers  Replicate within the host computer  Spread via cyber-contact  E-mail  Downloads  Networking  Can be both malicious or benign  Have the potential to cause serious damage
  • 3. How do Computer Viruses Spread?  Opening infected e-mail attachments  Accepting file transfers  Trojan delivery  Downloading infected programs or files from the internet, burned discs, USB flash drives, or other devices
  • 4. How do Computer Viruses Spread? (cont)  Downloading or using pirated programs, images, movies, music, or other files that are infected  Downloading programs that come with add-ons that contain viruses  Infected Computer networks
  • 5. What are the Symptoms?  Unstable functioning of systems or programs  Corrupted files and data  Missing programs or files  Appearance of unknown programs or files
  • 6. What are the Symptoms? (cont)  Fake anti-virus pop ups http://www.gamefreakzweb.com/2010_04_01_archive.html
  • 7. What are the Symptoms? (cont)  Missing desktop icons  Operating system fails to boot  Error messages  Disk space full http://blog.superuser.com/2012/02/17/wtfriday-what-happens-when-windows-runs-out-of-disk-space/
  • 8. What are the Symptoms? (cont)  Programs fail to launch  Websites are redirected or blocked  Genuine anti-virus company websites are blocked  Slow PC speed
  • 9. What are the Symptoms? (cont)  Operating system crashes The Blue Screen of Death http://the-black-wolf-co-uk.deviantart.com/art/The-Blue-Screen-Saver-of-Death-47473826
  • 10. Computer Viruses Works Cited Blue Screen of Death. PNG. <http://the-black-wolf-co-uk.deviantart.com/art/The-Blue-Screen- Saver-of-Death-47473826> Edison, George. disk_properties. PNG. <http://blog.superuser.com/2012/02/17/wtfriday-what- happens-when-windows-runs-out-of-disk-space/> OCAL. Compact Disc 2. Rolera, LLC.PNG. < http://www.clker.com/> OCAL. Computer Virus Character. Rolera, LLC.PNG. < http://www.clker.com/> OCAL. Cassette Bones. Rolera, LLC.PNG. < http://www.clker.com/> OCAL. Firefox. Rolera, LLC.JPG. < http://www.clker.com/> OCAL. Mail Attachment. Rolera, LLC.PNG. < http://www.clker.com/> OCAL. USB Thumbdrive. Rolera, LLC.PNG. < http://www.clker.com/> Saadi. Search. Rolera, LLC.PNG. < http://www.clker.com/> Tina. Example 1. Game FreakZ. PNG. <http://www.gamefreakzweb.com/ 2010_04_01_archive.html> Tina. Example 3. Game FreakZ. PNG. <http://www.gamefreakzweb.com/ 2010_04_01_archive.html>