SlideShare uma empresa Scribd logo
1 de 27
COMPUTER
VIRUSES
Presented by:

Aditi Ambekar
Angela Mary Binoy
Annies Minu SathiyaSeelan
SICK OF COMPUTER
VIRUSES?

What they are…
Where they come from…
Why they are here…
Index
1. History

2.Concept
3. Symptoms
4. Types Of Infections
6. Types Of Viruses
7.Conclusion
• The first computer virus was
called “Creeper.”It was
invented in the early
1970’s.Since then, millions of
viruses have been invented.
• The first known computer
virus was written in 1981 by a
man named Rich Skrenta . This
virus was termed Elk Cloner,
and was the first computer
virus to appear outside the
computer where it was
created in.
Virus +

DEATH
• A Computer Virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user.
• A Computer Virus has 2
major characteristics: the
ability to replicate itself, and
the ability to attach itself to
another computer file...
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
• Extensive pop-up ads.
• Inability to open files with existing passwords.
Malware

Viruses

Worms

Trojan
Horses
1.
2.
3.
4.
5.
6.
7.
8.

Boot Sector Virus.
Direct Action Virus.
File Infector Virus.
Macro Virus.
Multipartite Virus.
Polymorphic Virus.
Resident Virus.
Web Scripting Virus.
It places its own codes
and commands into
MBR.
Alters the search and
error page of a
browser and redirects
the user to its own
page.
•They load with the host program into
computer’s memory.
•They can be crafted with relative ease.
File Infector Virus
A file infector is a virus that infects an
executable file.

Typically affects only one type of file.
Macro Virus
• These type of virus infects word , excel,
PowerPoint, access and other data files.
Once infected repairing of these files is
very much difficult.
• May attack in more than one methods.
• A virus that can
encrypt its code in
different ways so
that it appears
differently in each
infection. These
viruses are more
difficult to detect.
•
•
•
•

Hides within the computers memory.
It activates whenever the OS loads or operates.
This virus may be pernicious.
It is of 2 types:
Fast Infector.
Slow Infector.
• Removal of this virus is bit tricky.
• It may be designed to block the actions of Anti
Virus programs.
There are few website that execute complex
code with the purpose to provide interesting
content ,these codes often get exploited and
due to this a virus becomes able to infect a
machine and to take actions on a machine via
website. This particular virus is called web
scripting virus
Infects computers running with
Microsoft Windows.
Discovered by IT security firm Seculert,
in December 2012.
Steals confidential data of the user.
Affects POS i.e. Point of sales.
Detected in online banking transaction
space on 19 January 2014 in India.
In 2012, a major ransom ware worm known as
Reveton began to spread.
A Reveton is a malware which attempts to
extort money from a user.
It claims that your computer has been used for
unauthorized activities.
Encrypting ransom ware appeared in 2013 with
a worm known as "Crypto Locker”.
It gets Distributed either as an attachment to a
malicious e-mail or as a drive-by download.
CryptoLocker demands a payment with either a
MoneyPak card or Bitcoin to recover the key.
CryptoLocker to be extremely difficult to repair.
THANK YOU!

Mais conteúdo relacionado

Mais procurados

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Mais procurados (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Hardware & Software
Hardware & SoftwareHardware & Software
Hardware & Software
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 

Semelhante a Computer Viruses

computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 

Semelhante a Computer Viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Proyecto7
Proyecto7Proyecto7
Proyecto7
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Malicious
MaliciousMalicious
Malicious
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Malware
MalwareMalware
Malware
 
anti_virus
anti_virusanti_virus
anti_virus
 

Último

Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Computer Viruses

  • 1. COMPUTER VIRUSES Presented by: Aditi Ambekar Angela Mary Binoy Annies Minu SathiyaSeelan
  • 2. SICK OF COMPUTER VIRUSES? What they are… Where they come from… Why they are here…
  • 3. Index 1. History 2.Concept 3. Symptoms 4. Types Of Infections 6. Types Of Viruses 7.Conclusion
  • 4. • The first computer virus was called “Creeper.”It was invented in the early 1970’s.Since then, millions of viruses have been invented. • The first known computer virus was written in 1981 by a man named Rich Skrenta . This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 6. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file...
  • 7. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Extensive pop-up ads. • Inability to open files with existing passwords.
  • 9. 1. 2. 3. 4. 5. 6. 7. 8. Boot Sector Virus. Direct Action Virus. File Infector Virus. Macro Virus. Multipartite Virus. Polymorphic Virus. Resident Virus. Web Scripting Virus.
  • 10. It places its own codes and commands into MBR.
  • 11. Alters the search and error page of a browser and redirects the user to its own page.
  • 12. •They load with the host program into computer’s memory. •They can be crafted with relative ease.
  • 13. File Infector Virus A file infector is a virus that infects an executable file. Typically affects only one type of file.
  • 14. Macro Virus • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 15. • May attack in more than one methods.
  • 16. • A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
  • 17. • • • • Hides within the computers memory. It activates whenever the OS loads or operates. This virus may be pernicious. It is of 2 types: Fast Infector. Slow Infector. • Removal of this virus is bit tricky. • It may be designed to block the actions of Anti Virus programs.
  • 18. There are few website that execute complex code with the purpose to provide interesting content ,these codes often get exploited and due to this a virus becomes able to infect a machine and to take actions on a machine via website. This particular virus is called web scripting virus
  • 19.
  • 20.
  • 21. Infects computers running with Microsoft Windows. Discovered by IT security firm Seculert, in December 2012. Steals confidential data of the user. Affects POS i.e. Point of sales. Detected in online banking transaction space on 19 January 2014 in India.
  • 22.
  • 23. In 2012, a major ransom ware worm known as Reveton began to spread. A Reveton is a malware which attempts to extort money from a user. It claims that your computer has been used for unauthorized activities.
  • 24.
  • 25.
  • 26. Encrypting ransom ware appeared in 2013 with a worm known as "Crypto Locker”. It gets Distributed either as an attachment to a malicious e-mail or as a drive-by download. CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key. CryptoLocker to be extremely difficult to repair.