SlideShare uma empresa Scribd logo
1 de 16
Virus vs Anti-virus An Armed Race By: Faheem ul haq Roll no:63
Definition of a Computer Virus Computer viruses can vary greatly from one another, but they are based in computer code – or a series of ones and zeros.  Though not all computer viruses are malicious, most tend to “infect” computer systems and overwrite or damage the software in an attempt to spread itself and comprise the system.  Viruses can be based in a number of formats: Java code, HTML code, hidden applets, text documents and several other things. In short, it is a computer program that is able to attach itself to disks or other files and replicate itself repeatively, often without the users knowledge. Although most viruses damage a system, it is not necessary for the definition of a virus.
Overview Background  Symptoms Classifying Viruses  Examples Protection/Prevention Conclusion
Background ,[object Object],[object Object],[object Object]
Symptoms of Virus Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Name  Discription Anti-Anti-virus -  Anti-antivirus viruses  attack,disable or infect specific anti-virus software.
Fast Infector Fast infector viruses, when active in memory, infect not only executed programs, but also those that are merely opened. Thus running an application, such as anti-virus software, which opens many programs but does not execute them, can result in all programs becoming infected . Macro Virus A macro virus is a malicious series of instructions designed to simplify repetitive tasks within a program. Macro viruses are written a macro programming language and attach to a document file (such as Word or Excel). When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage and copies itself into other documents. Continual use of the program results in the spread of the virus Mutating Virus A virus that stays in memory after it executes and infects other files when certain conditions are met.
Resident Virus A resident virus loads into memory and remains inactive until a trigger event. When the event occurs the virus activates, either infecting a file or disk, or causing other consequences. All boot viruses are resident viruses and so are the most common file viruses. Trojan Horse  Program A Trojan horse program is a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive. Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other files. Worms can create copies on the same computer, or can send the copies to other computers via a network.
Zoo Virus A zoo virus exists in the collections of researchers and has never infected a real world computer system
[object Object],[object Object],[object Object],[object Object],[object Object],Virus detection problems The following are undecidable :
ANTIVIRUS SOFTWARE ,[object Object],[object Object]
DICTIONARY ,[object Object],[object Object],[object Object],[object Object]
SUSPICIOUS BEHAVIOUR The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, the antivirus software can flag this suspicious behavior, alert a user, and ask what to do. Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against  brand-new viruses  that do not yet exist in any virus dictionaries. However, it can also sound a large number of  false positives , and users probably become  desensitized  to all the warnings. If the user clicks "Accept" on every such warning, then the antivirus software obviously gives no benefit to that user. This problem has worsened since 1997, since many more non-malicious program designs came to modify other .exe files without regard to this false positive issue. Therefore, most modern antivirus software uses this technique less and less
ISSUES OF CONCERN ,[object Object],[object Object],[object Object]
  ....cont ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks Questions?

Mais conteúdo relacionado

Mais procurados

Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)ainizbahari97
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 

Mais procurados (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus (Microsoft Word)
Computer virus (Microsoft Word)Computer virus (Microsoft Word)
Computer virus (Microsoft Word)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 

Destaque

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility programDhani Ahmad
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Management information system
Management information systemManagement information system
Management information systemAbhinandan Bedua
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security ITSTEFFI_MEDINA
 
Breeding for Different Flower Forms in Ornamental Crops
Breeding for Different Flower Forms in Ornamental CropsBreeding for Different Flower Forms in Ornamental Crops
Breeding for Different Flower Forms in Ornamental CropsAbhay Kumar Gaurav
 
Linux installation and booting process
Linux installation and booting processLinux installation and booting process
Linux installation and booting processSiddharth Jain
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsSomanath Kavalase
 
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDay
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDayAntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDay
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDayINCIDE
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 

Destaque (20)

MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Antivirus
AntivirusAntivirus
Antivirus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility program
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Management information system
Management information systemManagement information system
Management information system
 
Computer virus
Computer virusComputer virus
Computer virus
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
Internet Security IT
Internet Security ITInternet Security IT
Internet Security IT
 
Breeding for Different Flower Forms in Ornamental Crops
Breeding for Different Flower Forms in Ornamental CropsBreeding for Different Flower Forms in Ornamental Crops
Breeding for Different Flower Forms in Ornamental Crops
 
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and CountermeasuresAnti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures
 
Linux installation and booting process
Linux installation and booting processLinux installation and booting process
Linux installation and booting process
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDay
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDayAntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDay
AntiVirus Evasion Techniques Use of Crypters 2k14 at MundoHackerDay
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 

Semelhante a 11 virus vs. antivirus

Semelhante a 11 virus vs. antivirus (20)

Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus
VirusVirus
Virus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Presentation2
Presentation2Presentation2
Presentation2
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus vs antivirus
virus vs antivirusvirus vs antivirus
virus vs antivirus
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

11 virus vs. antivirus

  • 1. Virus vs Anti-virus An Armed Race By: Faheem ul haq Roll no:63
  • 2. Definition of a Computer Virus Computer viruses can vary greatly from one another, but they are based in computer code – or a series of ones and zeros. Though not all computer viruses are malicious, most tend to “infect” computer systems and overwrite or damage the software in an attempt to spread itself and comprise the system. Viruses can be based in a number of formats: Java code, HTML code, hidden applets, text documents and several other things. In short, it is a computer program that is able to attach itself to disks or other files and replicate itself repeatively, often without the users knowledge. Although most viruses damage a system, it is not necessary for the definition of a virus.
  • 3. Overview Background Symptoms Classifying Viruses Examples Protection/Prevention Conclusion
  • 4.
  • 5.
  • 6.
  • 7. Fast Infector Fast infector viruses, when active in memory, infect not only executed programs, but also those that are merely opened. Thus running an application, such as anti-virus software, which opens many programs but does not execute them, can result in all programs becoming infected . Macro Virus A macro virus is a malicious series of instructions designed to simplify repetitive tasks within a program. Macro viruses are written a macro programming language and attach to a document file (such as Word or Excel). When a document or template containing the macro virus is opened in the target application, the virus runs, does its damage and copies itself into other documents. Continual use of the program results in the spread of the virus Mutating Virus A virus that stays in memory after it executes and infects other files when certain conditions are met.
  • 8. Resident Virus A resident virus loads into memory and remains inactive until a trigger event. When the event occurs the virus activates, either infecting a file or disk, or causing other consequences. All boot viruses are resident viruses and so are the most common file viruses. Trojan Horse Program A Trojan horse program is a malicious program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive. Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other files. Worms can create copies on the same computer, or can send the copies to other computers via a network.
  • 9. Zoo Virus A zoo virus exists in the collections of researchers and has never infected a real world computer system
  • 10.
  • 11.
  • 12.
  • 13. SUSPICIOUS BEHAVIOUR The suspicious behavior approach, by contrast, doesn't attempt to identify known viruses, but instead monitors the behavior of all programs. If one program tries to write data to an executable program, for example, the antivirus software can flag this suspicious behavior, alert a user, and ask what to do. Unlike the dictionary approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it can also sound a large number of false positives , and users probably become desensitized to all the warnings. If the user clicks "Accept" on every such warning, then the antivirus software obviously gives no benefit to that user. This problem has worsened since 1997, since many more non-malicious program designs came to modify other .exe files without regard to this false positive issue. Therefore, most modern antivirus software uses this technique less and less
  • 14.
  • 15.