SlideShare uma empresa Scribd logo
1 de 21
Introduction 
 Computer virus have become today’s 
headline news. 
 With the increasing use of the internet, it 
has become easier for virus to spread. 
 Virus show us loopholes in software. 
 Most virus are targeted at the MS 
Windows OS.
What is a Virus ? 
 A virus is just a computer program. Like any 
other program, it contains instructions that 
tell your computer what to do. 
 But unlike an application, a virus usually 
tells your computer to do something you 
don't want it to do, and it can usually spread 
itself to other files on your computer -- and 
other people's computers.
 In some cases, a virus will execute only a 
gentle "personality quirk," such as causing 
your computer to make seemingly random 
bleeps. 
 But a virus can be very destructive; it could 
format your hard drive, overwrite your hard 
drive boot sector, or delete files and render 
your machine inoperable.
History of Viruses 
 As time progressed many other types of viruses 
were developed. 
 In 1992, four students at Cornell University 
created the MBDF virus. 
 This virus attacked Apple Macintosh 
computers. 
 The virus was released in three shareware 
programs: Obnoxious Tetris (computer game), 
Ten Tile Puzzle (computer game), and Tetris 
cycle (Trojan Horse program). 
 This virus was benign, but the perpetrators 
were severely punished.
General virus types 
 Boot Sector Virus 
 Macro Virus 
 Multipartite Virus 
 Polymorphic Virus 
 Worms 
 Trojan horses 
 E-mail viruses 
 Stealth Virus
How They Spread ? 
 Early viruses were pieces of code attached to 
a common program like a popular game or a 
popular word processor. 
 A person might download an infected game 
from the internet or copy it from a floppy 
disk and run it. 
 A virus like this is a small piece of code 
embedded in a larger, legitimate program. 
Any virus is designed to run first when the 
legitimate program gets executed.
 If one of the infected programs is given to 
another person on a floppy disk, or if it is 
uploaded to internet, then other programs get 
infected. 
 This is how the virus spreads.
The impact of viruses 
 ICSA Labs estimates that the cost of a 
virus disaster is between $50,000 and 
$500,000 
 Average server downtime for a virus 
is 14 hours
The impact of viruses
Examples of risky file types 
 The following file types should never be 
opened: 
 .EXE 
 .PIF 
 .BAT 
 .VBS 
 .COM
TOP 5 Viruses Reported 
14 
12 
10 
8 
6 
4 
2 
0 
W32/klez/h W32- 
Bugbear-A 
Percent Reported to 
Sophos 2003 
W32/ElKern- 
C
Symptoms of Virus Attack 
 Computer no longer boots up. 
 Screen sometimes flicker. 
 Computer runs slower then usual. 
 PC speaker beeps periodically. 
 System crashes for no reason. 
 Files/directories sometimes disappear. 
 Denial of service (dos)….. & Many More.
Prevention is the best cure 
 Run a secure operating system like 
UNIX or Windows NT. 
 Install virus protection software. 
 Avoid programs from unknown 
sources. 
 Disable floppy disk booting
 Macro Virus Protection is enabled in all 
Microsoft applications. 
 Never double-click on an attachment that 
contains an executable that arrives as an 
e-mail attachment.
Protect Yourself from Computer Viruses 
 AVIEN & AVI-EWS 
 CERT 
 STOPzilla 
 GFI Mail Security for 
Exchange 
 Anti Virus eScan 2003 
 CIAC 
 Cyber notes 
 ICSA 
 Information Security 
Magazine 
 NIPC (National 
Infrastructure Protection 
Ctr) 
 SANS Institute 
 Virus Bulletin
How To Scan?
Anti-Virus Is Scanning
Finding Out A Virus
Top 9 Virus Protectors are... 
1) PANDA ANTIVIRUS PLATIINUM v7.0 
2) NORTON ANTIVIRUS 2003 
3) F-PROT FOR WINDOWS 
4) MCAFEE VIRUSSCAN HOME EDITION 
7.0 
5) NORMAN VIRUS CONTROL 
6) PC-CILLIN 
7) BIT DEFENDER PROFESSIONAL v6.5 
8) NOD 32 
9) STOPzilla!
Computer virus

Mais conteúdo relacionado

Mais procurados

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 

Mais procurados (20)

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 

Destaque

As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Monday july 6 july 10,2015 epp lp
Monday                   july 6  july 10,2015 epp lpMonday                   july 6  july 10,2015 epp lp
Monday july 6 july 10,2015 epp lpEDITHA HONRADEZ
 
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictIct lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictMary Ann Encinas
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusMarie Jaja Tan Roa
 
Pagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayariPagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayaricaraganalyn
 
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)Jonah Salcedo
 
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusIct lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusMary Ann Encinas
 

Destaque (9)

As computer virus
As computer virusAs computer virus
As computer virus
 
Monday july 6 july 10,2015 epp lp
Monday                   july 6  july 10,2015 epp lpMonday                   july 6  july 10,2015 epp lp
Monday july 6 july 10,2015 epp lp
 
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ictIct lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
Ict lesson epp 4 aralin 9 pangangalap ng impormasyon gamit ang ict
 
Malware
MalwareMalware
Malware
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Malware
MalwareMalware
Malware
 
Pagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayariPagsusunod sunod ng mga pangyayari
Pagsusunod sunod ng mga pangyayari
 
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
PAGSUSUNOD-SUNOD (Sekwensyal, Kronolohikal, Prosidyural)
 
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virusIct lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
Ict lesson epp 4 aralin 8 mga panganib na dulot ng malware at computer virus
 

Semelhante a Computer virus (20)

Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus.pptx
Computer Virus.pptxComputer Virus.pptx
Computer Virus.pptx
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 

Mais de Shailendra Gohil

Cng as alternate to gasoline
Cng as alternate to gasolineCng as alternate to gasoline
Cng as alternate to gasolineShailendra Gohil
 
Document authentication system with graphical security and sound
Document authentication system with graphical security and soundDocument authentication system with graphical security and sound
Document authentication system with graphical security and soundShailendra Gohil
 

Mais de Shailendra Gohil (6)

Combinational circuit
Combinational circuitCombinational circuit
Combinational circuit
 
Xml
Xml Xml
Xml
 
Features Of Office 2007
Features Of Office 2007Features Of Office 2007
Features Of Office 2007
 
Cng as alternate to gasoline
Cng as alternate to gasolineCng as alternate to gasoline
Cng as alternate to gasoline
 
Document authentication system with graphical security and sound
Document authentication system with graphical security and soundDocument authentication system with graphical security and sound
Document authentication system with graphical security and sound
 
History of orkut
History of orkutHistory of orkut
History of orkut
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Computer virus

  • 1.
  • 2. Introduction  Computer virus have become today’s headline news.  With the increasing use of the internet, it has become easier for virus to spread.  Virus show us loopholes in software.  Most virus are targeted at the MS Windows OS.
  • 3. What is a Virus ?  A virus is just a computer program. Like any other program, it contains instructions that tell your computer what to do.  But unlike an application, a virus usually tells your computer to do something you don't want it to do, and it can usually spread itself to other files on your computer -- and other people's computers.
  • 4.  In some cases, a virus will execute only a gentle "personality quirk," such as causing your computer to make seemingly random bleeps.  But a virus can be very destructive; it could format your hard drive, overwrite your hard drive boot sector, or delete files and render your machine inoperable.
  • 5. History of Viruses  As time progressed many other types of viruses were developed.  In 1992, four students at Cornell University created the MBDF virus.  This virus attacked Apple Macintosh computers.  The virus was released in three shareware programs: Obnoxious Tetris (computer game), Ten Tile Puzzle (computer game), and Tetris cycle (Trojan Horse program).  This virus was benign, but the perpetrators were severely punished.
  • 6. General virus types  Boot Sector Virus  Macro Virus  Multipartite Virus  Polymorphic Virus  Worms  Trojan horses  E-mail viruses  Stealth Virus
  • 7. How They Spread ?  Early viruses were pieces of code attached to a common program like a popular game or a popular word processor.  A person might download an infected game from the internet or copy it from a floppy disk and run it.  A virus like this is a small piece of code embedded in a larger, legitimate program. Any virus is designed to run first when the legitimate program gets executed.
  • 8.  If one of the infected programs is given to another person on a floppy disk, or if it is uploaded to internet, then other programs get infected.  This is how the virus spreads.
  • 9. The impact of viruses  ICSA Labs estimates that the cost of a virus disaster is between $50,000 and $500,000  Average server downtime for a virus is 14 hours
  • 10. The impact of viruses
  • 11. Examples of risky file types  The following file types should never be opened:  .EXE  .PIF  .BAT  .VBS  .COM
  • 12. TOP 5 Viruses Reported 14 12 10 8 6 4 2 0 W32/klez/h W32- Bugbear-A Percent Reported to Sophos 2003 W32/ElKern- C
  • 13. Symptoms of Virus Attack  Computer no longer boots up.  Screen sometimes flicker.  Computer runs slower then usual.  PC speaker beeps periodically.  System crashes for no reason.  Files/directories sometimes disappear.  Denial of service (dos)….. & Many More.
  • 14. Prevention is the best cure  Run a secure operating system like UNIX or Windows NT.  Install virus protection software.  Avoid programs from unknown sources.  Disable floppy disk booting
  • 15.  Macro Virus Protection is enabled in all Microsoft applications.  Never double-click on an attachment that contains an executable that arrives as an e-mail attachment.
  • 16. Protect Yourself from Computer Viruses  AVIEN & AVI-EWS  CERT  STOPzilla  GFI Mail Security for Exchange  Anti Virus eScan 2003  CIAC  Cyber notes  ICSA  Information Security Magazine  NIPC (National Infrastructure Protection Ctr)  SANS Institute  Virus Bulletin
  • 19. Finding Out A Virus
  • 20. Top 9 Virus Protectors are... 1) PANDA ANTIVIRUS PLATIINUM v7.0 2) NORTON ANTIVIRUS 2003 3) F-PROT FOR WINDOWS 4) MCAFEE VIRUSSCAN HOME EDITION 7.0 5) NORMAN VIRUS CONTROL 6) PC-CILLIN 7) BIT DEFENDER PROFESSIONAL v6.5 8) NOD 32 9) STOPzilla!