SlideShare uma empresa Scribd logo
1 de 14
“COMPUTER VIRUS”
WHAT ARE COMPUTER VIRUS? ? ?
 A computer virus is a type of malicious
code or program written to alter the way
a computer operates and that is
designed to spread from one computer
to another. A virus operates by inserting
or attaching itself to a legitimate
program or document that supports
macros in order to execute its code.
WHAT IS COMPUTER VIRUS? ? ? (Conti.)
 In the process a virus has the potential
to cause unexpected or damaging
effects, such as harming the system
software by corrupting or destroying
data.
SOME OF THE viruses :-
1.) ILOVEU:- The ILOVEYOU virus is considered one of
the most virulent computer virus ever created and it’s not hard
to see. causing damages totaling in at an estimate of $10 billion.
10% of the world’s Internet-connected computers were believed to
have been infected. It was so bad that governments and large
corporations took their mailing system offline to prevent infection.
Cont…
2.) SASSER :- A Windows worm first discovered in 2004,
it was created by computer science student Sven Jaschan, who
also created the Netsky worm. it slows down and crashes the
computer, while making it hard to reset without cutting the power.
This led to more than a million infections, taking out critical
infrastructures, such as airlines, news agencies, public
transportation, hospitals, public transport, etc. Overall, the damage
was estimated to have cost $18 billion.. Jaschen was tried as
a minor and received a 21 month suspended sentence.
Cont…
3.) ZEUS :- Zeus is a Trojan horse made to infect Windows
computers so that it will perform various criminal tasks. The most
common of these tasks are usually man in the browser key
logging and form grabbing. It managed to compromise thousands
of FTP accounts and computers from large multinational
corporations and banks such as Amazon, Oracle, Bank of
America, Cisco, etc. Controllers of the Zeus botnet used it to steal
the login credentials of social network, email and banking accounts.
Cont…
4.) MYDOOM :- Surfacing in 2004, Mydoom was a worm for
Windows that became one of the fastest spreading email worm.
The author is unknown and it is believed that the creator was paid
to create it since it contains the text message, “andy; I’m just doing
my job, nothing personal, sorry,”. The worm spreads itself by
appearing as an email transmission error and contains an
attachment of itself. It was believed that the worm was created
to disrupt SCO due to conflict over ownership of some Linux code.
It caused an estimate of $38.5 billion in damages and the worm is
still active in some form today.
Where DOES VIRUS ATTACKS OUR SYSTEM? ? ?
 Once a computer virus has infected your
system, it can rapidly spread through
other programs and begin affecting your
computer's operating system and your
valuable data. A computer virus is
designed to self-replicate, self-install,
and attack the root functions of various
programs without authorization or the
user’s knowledge.
Where DOES VIRUS ATTACKS OUR SYSTEM? ? ? (cont…)
 Viruses commonly infect executable programs or
those programs where files are used to start up
and launch other computer programs. Since these
are executed upon each start up session, the virus
can spread quickly and grow in size over a very
short period of time.
VIRUS ATTACK :-
SOURCE OF VIRUSES ? ? ?
1.) Email and text message attachments,
2.) Internet file downloads,
3.) Social media scam links,
4.) Connecting devices that are not
protected/scanned
(such as pendrives,HDD,smartphones,etc…),
5.) File sharing apps.
How to protect our system ? ? ?
1.) Keep your software up-to-date,
2.) Use a hardware-based firewall,
3.) Don't click on email links or attachments,
4.) Install quality antivirus,
5.) Perform daily scans.
Some of the anti-viruses…
1. Quick Heal
2. avast
3. KaSperSkY
4. Norton
5. PANDA
6. es-et
7. webroot
Virus

Mais conteúdo relacionado

Mais procurados

Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attackBhavesh soni
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virusHuma Tariq
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2ianpoblete13
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar pptvipinkumar940
 
A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 ianpoblete13
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 

Mais procurados (19)

Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Malwares
MalwaresMalwares
Malwares
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malware
MalwareMalware
Malware
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Assignment of virus
Assignment of virusAssignment of virus
Assignment of virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Malware
MalwareMalware
Malware
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malwares
MalwaresMalwares
Malwares
 
A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1 A Trip to ICT and Society Series 1 : INFECTED! PART 1
A Trip to ICT and Society Series 1 : INFECTED! PART 1
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 

Semelhante a Virus

Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).pptPrinceYdvz
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 

Semelhante a Virus (20)

COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Malware
MalwareMalware
Malware
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses (2).ppt
Viruses (2).pptViruses (2).ppt
Viruses (2).ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
Viruses
VirusesViruses
Viruses
 
Viruses (1).ppt
Viruses (1).pptViruses (1).ppt
Viruses (1).ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Malware
MalwareMalware
Malware
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Virus

  • 2. WHAT ARE COMPUTER VIRUS? ? ?  A computer virus is a type of malicious code or program written to alter the way a computer operates and that is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.
  • 3. WHAT IS COMPUTER VIRUS? ? ? (Conti.)  In the process a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data.
  • 4. SOME OF THE viruses :- 1.) ILOVEU:- The ILOVEYOU virus is considered one of the most virulent computer virus ever created and it’s not hard to see. causing damages totaling in at an estimate of $10 billion. 10% of the world’s Internet-connected computers were believed to have been infected. It was so bad that governments and large corporations took their mailing system offline to prevent infection.
  • 5. Cont… 2.) SASSER :- A Windows worm first discovered in 2004, it was created by computer science student Sven Jaschan, who also created the Netsky worm. it slows down and crashes the computer, while making it hard to reset without cutting the power. This led to more than a million infections, taking out critical infrastructures, such as airlines, news agencies, public transportation, hospitals, public transport, etc. Overall, the damage was estimated to have cost $18 billion.. Jaschen was tried as a minor and received a 21 month suspended sentence.
  • 6. Cont… 3.) ZEUS :- Zeus is a Trojan horse made to infect Windows computers so that it will perform various criminal tasks. The most common of these tasks are usually man in the browser key logging and form grabbing. It managed to compromise thousands of FTP accounts and computers from large multinational corporations and banks such as Amazon, Oracle, Bank of America, Cisco, etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and banking accounts.
  • 7. Cont… 4.) MYDOOM :- Surfacing in 2004, Mydoom was a worm for Windows that became one of the fastest spreading email worm. The author is unknown and it is believed that the creator was paid to create it since it contains the text message, “andy; I’m just doing my job, nothing personal, sorry,”. The worm spreads itself by appearing as an email transmission error and contains an attachment of itself. It was believed that the worm was created to disrupt SCO due to conflict over ownership of some Linux code. It caused an estimate of $38.5 billion in damages and the worm is still active in some form today.
  • 8. Where DOES VIRUS ATTACKS OUR SYSTEM? ? ?  Once a computer virus has infected your system, it can rapidly spread through other programs and begin affecting your computer's operating system and your valuable data. A computer virus is designed to self-replicate, self-install, and attack the root functions of various programs without authorization or the user’s knowledge.
  • 9. Where DOES VIRUS ATTACKS OUR SYSTEM? ? ? (cont…)  Viruses commonly infect executable programs or those programs where files are used to start up and launch other computer programs. Since these are executed upon each start up session, the virus can spread quickly and grow in size over a very short period of time.
  • 11. SOURCE OF VIRUSES ? ? ? 1.) Email and text message attachments, 2.) Internet file downloads, 3.) Social media scam links, 4.) Connecting devices that are not protected/scanned (such as pendrives,HDD,smartphones,etc…), 5.) File sharing apps.
  • 12. How to protect our system ? ? ? 1.) Keep your software up-to-date, 2.) Use a hardware-based firewall, 3.) Don't click on email links or attachments, 4.) Install quality antivirus, 5.) Perform daily scans.
  • 13. Some of the anti-viruses… 1. Quick Heal 2. avast 3. KaSperSkY 4. Norton 5. PANDA 6. es-et 7. webroot

Notas do Editor

  1. Grabber is a device that captures data. The term is used most often to describe devices that can capture full-motion video from a television or video camera and convert it to digital form for storageon a computer's disk.