SlideShare uma empresa Scribd logo
1 de 16
Done by: Abir Almaqrashi
Ahlam Alabri
Shiekha AlRashdi
The Outline
 Definition of viruses.
 Why people create viruses.
 How the viruses enter your computer.
 Examples of viruses.
 Protecting information & computer.
 Definition of antivirus.
 Antivirus functionality.
 Examples of antivirus.
 Selecting an antivirus.
It is a small software program that is
designed to replicate itself. It has a negative
effect, such as causing a program to operate
incorrectly or corrupting a computer's
memory.
What is a Computer Viruses
Why people create computer viruses
 To make money.
 To steal account information.
 To cause problems and trouble for others.
How the viruses enter your computer?
1. Internet
 Software , gaming and multimedia
downloads
 Opening e-mail attachments
 Accepting without reading
2. Devices
 USB devices
 CD,DVD
 Bluetooth device.
 Mobile devices.
Examples of Viruses
1. Boot Sector Virus
2. Macro Virus
3. File Virus
4. Steath Virus
5. Polymorphic virus
6. Multipartite Virus
7. Worm
8. Trojans
9. shortcut virus
How to protect information in general.
Keep your computer clean and cool .
Use clean, steady power source .
Keep backups.
Use good password.
Keep your OS up to date.
Run a personal firewall.
Delete spam
Do not install shareware
Download and install a spyware removal tool.
How to protect your computer from viruses
 Technical measures
Anti-virus software
Update
 Check mail-servers
 Reject all e-mails of dangerous or unknown extensions
 Back up your important files
 scan any removable hardware
 Install security updates for your operating system and
programs
How to protect your computer from viruses
The definition of antivirus.
antivirus" is protective software designed to
defend your computer against malicious
software.
How Antivirus Software Works
 On-Access Scanning
 Full System Scans
 Virus Definitions
 Heuristics
Examples of Anti-Virus Software
 Shield Deluxe
 Trend Micro
 Norton Antivirus
 Panda Antivirus Pro
Examples of Anti-Virus Software
 Zone Alarm Anti-Virus
 Vipre Antivirus
 BitDefender Antivirus
 Kaspersky Antivirus
How to Choose the Right Antivirus Software
for Your PC
1. narrowed the list to meet your operating
system
2. narrowed the list to meet your usage needs
3. check the major certification and testing
agencies
4. (detection) check out the test scores
5. Evaluation
The top 10 antivirus software 2013
reviewed by (toptenantivirus.net )
BitDefender Antivirus
Vipre Antivirus
Perfect Antivirus
Kaspersky Antivirus
5 Norton Antivirus
ESET Nod32 Antivirus 5
F-Secure Antivirus
TrendMicro Titanium Antivirus
Zonealarm Antivirus
McAfee Antivirus Plus
Computer viruses

Mais conteúdo relacionado

Mais procurados

Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 

Mais procurados (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Destaque

Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
kmtschida
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new product
Faiza Javaid
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Destaque (16)

Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instan...
 
07 viruses
07   viruses07   viruses
07 viruses
 
general organization and characterstics of virus
general organization and characterstics of virusgeneral organization and characterstics of virus
general organization and characterstics of virus
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
The Real Threats to Your Presentation Success
The Real Threats to Your Presentation SuccessThe Real Threats to Your Presentation Success
The Real Threats to Your Presentation Success
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Security threats
Security threatsSecurity threats
Security threats
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
virus powerpoint
virus powerpointvirus powerpoint
virus powerpoint
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Report on launching of new product
Report on launching of new productReport on launching of new product
Report on launching of new product
 
Threats to internal and external validity
Threats to internal and external validityThreats to internal and external validity
Threats to internal and external validity
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Semelhante a Computer viruses

Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
Sejahtera Affif
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 

Semelhante a Computer viruses (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
The Various Classes of Antivirus!
The Various Classes of Antivirus!The Various Classes of Antivirus!
The Various Classes of Antivirus!
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus project
Virus projectVirus project
Virus project
 
Antivirus
AntivirusAntivirus
Antivirus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 

Mais de Abir Almaqrashi

E learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptxE learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptx
Abir Almaqrashi
 

Mais de Abir Almaqrashi (20)

دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟دليل المعلم لدرس كيف أتوضأ؟
دليل المعلم لدرس كيف أتوضأ؟
 
Evaluation
EvaluationEvaluation
Evaluation
 
Squ الجامعة الرقمية
Squ الجامعة الرقميةSqu الجامعة الرقمية
Squ الجامعة الرقمية
 
Evaluation of chem lab software.
Evaluation of chem lab software.Evaluation of chem lab software.
Evaluation of chem lab software.
 
Click go-decision-tool
Click go-decision-toolClick go-decision-tool
Click go-decision-tool
 
The color presentation
The color presentationThe color presentation
The color presentation
 
E learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptxE learning and-its_applicability_in_basic_education.pptx
E learning and-its_applicability_in_basic_education.pptx
 
Using multimedia
Using multimedia Using multimedia
Using multimedia
 
فعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوانفعاليات ليوم الشجرة بعنوان
فعاليات ليوم الشجرة بعنوان
 
تصميم مدونة الكترونية
تصميم مدونة الكترونيةتصميم مدونة الكترونية
تصميم مدونة الكترونية
 
Writing de materials11
Writing de materials11Writing de materials11
Writing de materials11
 
Writing de materials1
Writing de materials1Writing de materials1
Writing de materials1
 
Applying actions model
Applying actions modelApplying actions model
Applying actions model
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Mlearning
MlearningMlearning
Mlearning
 
Nsd
NsdNsd
Nsd
 
Tech 4101 1
Tech 4101 1Tech 4101 1
Tech 4101 1
 
Tech4101 1
 Tech4101 1 Tech4101 1
Tech4101 1
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Computer viruses

  • 1. Done by: Abir Almaqrashi Ahlam Alabri Shiekha AlRashdi
  • 2. The Outline  Definition of viruses.  Why people create viruses.  How the viruses enter your computer.  Examples of viruses.  Protecting information & computer.  Definition of antivirus.  Antivirus functionality.  Examples of antivirus.  Selecting an antivirus.
  • 3. It is a small software program that is designed to replicate itself. It has a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. What is a Computer Viruses
  • 4. Why people create computer viruses  To make money.  To steal account information.  To cause problems and trouble for others.
  • 5. How the viruses enter your computer? 1. Internet  Software , gaming and multimedia downloads  Opening e-mail attachments  Accepting without reading 2. Devices  USB devices  CD,DVD  Bluetooth device.  Mobile devices.
  • 6. Examples of Viruses 1. Boot Sector Virus 2. Macro Virus 3. File Virus 4. Steath Virus 5. Polymorphic virus 6. Multipartite Virus 7. Worm 8. Trojans 9. shortcut virus
  • 7. How to protect information in general. Keep your computer clean and cool . Use clean, steady power source . Keep backups. Use good password. Keep your OS up to date. Run a personal firewall. Delete spam Do not install shareware Download and install a spyware removal tool.
  • 8. How to protect your computer from viruses  Technical measures Anti-virus software Update  Check mail-servers  Reject all e-mails of dangerous or unknown extensions
  • 9.  Back up your important files  scan any removable hardware  Install security updates for your operating system and programs How to protect your computer from viruses
  • 10. The definition of antivirus. antivirus" is protective software designed to defend your computer against malicious software.
  • 11. How Antivirus Software Works  On-Access Scanning  Full System Scans  Virus Definitions  Heuristics
  • 12. Examples of Anti-Virus Software  Shield Deluxe  Trend Micro  Norton Antivirus  Panda Antivirus Pro
  • 13. Examples of Anti-Virus Software  Zone Alarm Anti-Virus  Vipre Antivirus  BitDefender Antivirus  Kaspersky Antivirus
  • 14. How to Choose the Right Antivirus Software for Your PC 1. narrowed the list to meet your operating system 2. narrowed the list to meet your usage needs 3. check the major certification and testing agencies 4. (detection) check out the test scores 5. Evaluation
  • 15. The top 10 antivirus software 2013 reviewed by (toptenantivirus.net ) BitDefender Antivirus Vipre Antivirus Perfect Antivirus Kaspersky Antivirus 5 Norton Antivirus ESET Nod32 Antivirus 5 F-Secure Antivirus TrendMicro Titanium Antivirus Zonealarm Antivirus McAfee Antivirus Plus