SlideShare uma empresa Scribd logo
1 de 16
Done by: Abir Almaqrashi
Ahlam Alabri
Shiekha AlRashdi
The Outline
 Definition of viruses.
 Why people create viruses.
 How the viruses enter your computer.
 Examples of viruses.
 Protecting information & computer.
 Definition of antivirus.
 Antivirus functionality.
 Examples of antivirus.
 Selecting an antivirus.
It is a small software program that is
designed to replicate itself. It has a negative
effect, such as causing a program to operate
incorrectly or corrupting a computer's
memory.
What is a Computer Viruses
Why people create computer viruses
 To make money.
 To steal account information.
 To cause problems and trouble for others.
How the viruses enter your computer?
1. Internet
 Software , gaming and multimedia
downloads
 Opening e-mail attachments
 Accepting without reading
2. Devices
 USB devices
 CD,DVD
 Bluetooth device.
 Mobile devices.
Examples of Viruses
1. Boot Sector Virus
2. Macro Virus
3. File Virus
4. Steath Virus
5. Polymorphic virus
6. Multipartite Virus
7. Worm
8. Trojans
9. shortcut virus
How to protect information in general.
Keep your computer clean and cool .
Use clean, steady power source .
Keep backups.
Use good password.
Keep your OS up to date.
Run a personal firewall.
Delete spam
Do not install shareware
Download and install a spyware removal tool.
How to protect your computer from viruses
 Technical measures
Anti-virus software
Update
 Check mail-servers
 Reject all e-mails of dangerous or unknown extensions
 Back up your important files
 scan any removable hardware
 Install security updates for your operating system and
programs
How to protect your computer from viruses
The definition of antivirus.
antivirus" is protective software designed to
defend your computer against malicious
software.
How Antivirus Software Works
 On-Access Scanning
 Full System Scans
 Virus Definitions
 Heuristics
Examples of Anti-Virus Software
 Shield Deluxe
 Trend Micro
 Norton Antivirus
 Panda Antivirus Pro
Examples of Anti-Virus Software
 Zone Alarm Anti-Virus
 Vipre Antivirus
 BitDefender Antivirus
 Kaspersky Antivirus
How to Choose the Right Antivirus Software
for Your PC
1. narrowed the list to meet your operating
system
2. narrowed the list to meet your usage needs
3. check the major certification and testing
agencies
4. (detection) check out the test scores
5. Evaluation
The top 10 antivirus software 2013
reviewed by (toptenantivirus.net )
BitDefender Antivirus
Vipre Antivirus
Perfect Antivirus
Kaspersky Antivirus
5 Norton Antivirus
ESET Nod32 Antivirus 5
F-Secure Antivirus
TrendMicro Titanium Antivirus
Zonealarm Antivirus
McAfee Antivirus Plus
How Viruses Enter Computers and How to Protect With Antivirus

Mais conteúdo relacionado

Mais procurados

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virusNaveen Goyal
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Mais procurados (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Destaque

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Jaime Sánchez
 
general organization and characterstics of virus
general organization and characterstics of virusgeneral organization and characterstics of virus
general organization and characterstics of virusMohd Asif Kanth
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessMichelle Mazur
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpointkmtschida
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new productFaiza Javaid
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validityrodsazon
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Destaque (16)

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
07 viruses
07   viruses07   viruses
07 viruses
 
general organization and characterstics of virus
general organization and characterstics of virusgeneral organization and characterstics of virus
general organization and characterstics of virus
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation Success
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new product
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validity
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Semelhante a How Viruses Enter Computers and How to Protect With Antivirus

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 

Semelhante a How Viruses Enter Computers and How to Protect With Antivirus (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Antivirus
AntivirusAntivirus
Antivirus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 

Mais de Abir Almaqrashi

Mais de Abir Almaqrashi (20)

دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟
 
Evaluation
EvaluationEvaluation
Evaluation
 
Squ الجامعة الرقمية
Squ الجامعة الرقميةSqu الجامعة الرقمية
Squ الجامعة الرقمية
 
Evaluation of chem lab software.
Evaluation of chem lab software.Evaluation of chem lab software.
Evaluation of chem lab software.
 
Click go-decision-tool
Click go-decision-toolClick go-decision-tool
Click go-decision-tool
 
The color presentation
The color presentationThe color presentation
The color presentation
 
E learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptxE learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptx
 
Using multimedia
Using multimedia Using multimedia
Using multimedia
 
فعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوانفعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوان
 
تصميم مدونة الكترونية
تصميم مدونة الكترونيةتصميم مدونة الكترونية
تصميم مدونة الكترونية
 
Writing de materials11
Writing de materials11Writing de materials11
Writing de materials11
 
Writing de materials1
Writing de materials1Writing de materials1
Writing de materials1
 
Applying actions model
Applying actions modelApplying actions model
Applying actions model
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Nsd
NsdNsd
Nsd
 
Tech 4101 1
Tech 4101 1Tech 4101 1
Tech 4101 1
 
Tech4101 1
 Tech4101 1 Tech4101 1
Tech4101 1
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

How Viruses Enter Computers and How to Protect With Antivirus

  • 1. Done by: Abir Almaqrashi Ahlam Alabri Shiekha AlRashdi
  • 2. The Outline  Definition of viruses.  Why people create viruses.  How the viruses enter your computer.  Examples of viruses.  Protecting information & computer.  Definition of antivirus.  Antivirus functionality.  Examples of antivirus.  Selecting an antivirus.
  • 3. It is a small software program that is designed to replicate itself. It has a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. What is a Computer Viruses
  • 4. Why people create computer viruses  To make money.  To steal account information.  To cause problems and trouble for others.
  • 5. How the viruses enter your computer? 1. Internet  Software , gaming and multimedia downloads  Opening e-mail attachments  Accepting without reading 2. Devices  USB devices  CD,DVD  Bluetooth device.  Mobile devices.
  • 6. Examples of Viruses 1. Boot Sector Virus 2. Macro Virus 3. File Virus 4. Steath Virus 5. Polymorphic virus 6. Multipartite Virus 7. Worm 8. Trojans 9. shortcut virus
  • 7. How to protect information in general. Keep your computer clean and cool . Use clean, steady power source . Keep backups. Use good password. Keep your OS up to date. Run a personal firewall. Delete spam Do not install shareware Download and install a spyware removal tool.
  • 8. How to protect your computer from viruses  Technical measures Anti-virus software Update  Check mail-servers  Reject all e-mails of dangerous or unknown extensions
  • 9.  Back up your important files  scan any removable hardware  Install security updates for your operating system and programs How to protect your computer from viruses
  • 10. The definition of antivirus. antivirus" is protective software designed to defend your computer against malicious software.
  • 11. How Antivirus Software Works  On-Access Scanning  Full System Scans  Virus Definitions  Heuristics
  • 12. Examples of Anti-Virus Software  Shield Deluxe  Trend Micro  Norton Antivirus  Panda Antivirus Pro
  • 13. Examples of Anti-Virus Software  Zone Alarm Anti-Virus  Vipre Antivirus  BitDefender Antivirus  Kaspersky Antivirus
  • 14. How to Choose the Right Antivirus Software for Your PC 1. narrowed the list to meet your operating system 2. narrowed the list to meet your usage needs 3. check the major certification and testing agencies 4. (detection) check out the test scores 5. Evaluation
  • 15. The top 10 antivirus software 2013 reviewed by (toptenantivirus.net ) BitDefender Antivirus Vipre Antivirus Perfect Antivirus Kaspersky Antivirus 5 Norton Antivirus ESET Nod32 Antivirus 5 F-Secure Antivirus TrendMicro Titanium Antivirus Zonealarm Antivirus McAfee Antivirus Plus