SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
UNIVERSITY OF SORAN
Faculty of science & engineering
School of engineering
DPT of petroleum engineering
VIRUS
Prepared by:
Harem Abdullstar
Rebaz Abdullqadr
Omer Muhammed
Supervisor :
Mr. Aras Masoud
Contents?
what's a computer virus ?
Types of Viruses
Categories of Viruses
How do viruses work?
How an Antivirus works?
Conclusion
What is a virus?
A computer virus is a computer program that
can copy itself and infect a computer without
permission or knowledge of the user.
The computer viruses can damage or
corrupt data, modify existing data .
Types of virus
Boot sector Virus
Master Boot Record virus (MBR)
File infector virus
 Multipartite virus
 Macro Virus
Trojan Horse
 Worms
Logic Bombs
Polymorphic Virus
Boot sector Virus
 A boot sector virus infects boot sector of
computers. During system boot, boot
sector virus is loaded into main memory
and destroys data stored in hard disk.
E.g. Form, Disk
Killer, Michelangelo, Stoned.
Master Boot Record virus (MBR)
MBR viruses are memory-resident viruses
that infect disks in the same manner as
boot sector viruses.
E.g. AntiEXE, Unashamed, NYB
File infector virus
File infector viruses infect program files.
Normally infect executable code, such as
.COM, .SYS, .BAT and .EXE files.
E.g. Snow.A, Jerusalem, Cascade
Multipartite virus
A multipartite virus is a virus that can infect either
boot sectors or executables.
When it infects a boot sector, it works as a boot
sector infector.
E.g. One_Half, Emperor, Anthrax, Tequilla.
Macro Virus
Macro viruses infect files that are created using
certain applications or programs that contain
macros.
They infect documents created from Microsoft
Office Word, Excel, PowerPoint and Access files.
E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M.
Groov.
Trojan Horse
A Trojan horse is a computer program that is
hiding a virus or other potentially damaging
program.
Trojan horses can be included in software that
you download for free or as attachments in
email messages.
E.g. Trojan.Vundo. Back
Orifice, NetBus, SubSeven
Worms
A computer worm is a self-replicating computer
program. It uses a network to send copies of
itself to other and it may do so without any user
intervention.
Work of worms
delete files on a host system
send documents via email
E.g.W32.Mydoom.AX@mm
How do viruses work?
Replicating itself
Interrupting system/network use
Modifying configuration settings
Flashing BIOS
Format hard drive/destroy data
Using computer/network resources
How an Antivirus works?
The antivirus software examines each and every
file in a computer and examines its content with
the virus definitions stored in its virus dictionary.
E.g. Avira
Kaspersky
Norton
Many more ……………
Thanks for your attention

Mais conteúdo relacionado

Mais procurados (20)

Virus
VirusVirus
Virus
 
virus
virusvirus
virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Semelhante a Virus soran university

Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & MalwareT.J. Schiel
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxDEEP TIWARI
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxNORTHCUSTOMS
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxDEEP TIWARI
 

Semelhante a Virus soran university (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
suraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptxsuraj singh Bed PPT(Computer Virus and its management).pptx
suraj singh Bed PPT(Computer Virus and its management).pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
 

Último

Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainData modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainAbdul Ahad
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonApplitools
 
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotCopilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotEdgard Alejos
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfkalichargn70th171
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 

Último (20)

Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainData modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software Domain
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + KobitonLeveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
Leveraging AI for Mobile App Testing on Real Devices | Applitools + Kobiton
 
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotCopilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform Copilot
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 

Virus soran university

  • 1. UNIVERSITY OF SORAN Faculty of science & engineering School of engineering DPT of petroleum engineering VIRUS Prepared by: Harem Abdullstar Rebaz Abdullqadr Omer Muhammed Supervisor : Mr. Aras Masoud
  • 2. Contents? what's a computer virus ? Types of Viruses Categories of Viruses How do viruses work? How an Antivirus works? Conclusion
  • 3. What is a virus? A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The computer viruses can damage or corrupt data, modify existing data .
  • 4. Types of virus Boot sector Virus Master Boot Record virus (MBR) File infector virus  Multipartite virus  Macro Virus Trojan Horse  Worms Logic Bombs Polymorphic Virus
  • 5. Boot sector Virus  A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. E.g. Form, Disk Killer, Michelangelo, Stoned.
  • 6. Master Boot Record virus (MBR) MBR viruses are memory-resident viruses that infect disks in the same manner as boot sector viruses. E.g. AntiEXE, Unashamed, NYB
  • 7. File infector virus File infector viruses infect program files. Normally infect executable code, such as .COM, .SYS, .BAT and .EXE files. E.g. Snow.A, Jerusalem, Cascade
  • 8. Multipartite virus A multipartite virus is a virus that can infect either boot sectors or executables. When it infects a boot sector, it works as a boot sector infector. E.g. One_Half, Emperor, Anthrax, Tequilla.
  • 9. Macro Virus Macro viruses infect files that are created using certain applications or programs that contain macros. They infect documents created from Microsoft Office Word, Excel, PowerPoint and Access files. E.g.W97M.Melissa, Bablas, WM.NiceDay, W97M. Groov.
  • 10. Trojan Horse A Trojan horse is a computer program that is hiding a virus or other potentially damaging program. Trojan horses can be included in software that you download for free or as attachments in email messages. E.g. Trojan.Vundo. Back Orifice, NetBus, SubSeven
  • 11. Worms A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other and it may do so without any user intervention. Work of worms delete files on a host system send documents via email E.g.W32.Mydoom.AX@mm
  • 12. How do viruses work? Replicating itself Interrupting system/network use Modifying configuration settings Flashing BIOS Format hard drive/destroy data Using computer/network resources
  • 13. How an Antivirus works? The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. E.g. Avira Kaspersky Norton Many more ……………
  • 14. Thanks for your attention