SlideShare a Scribd company logo
1 of 20
CONTENTS
INTRODUCTION.
Similarities B/w Biological & Computer Virus.
How Does A Virus Work?
Life Cycle Of Computer Virus.
Functional Diagram of VIRUS.
Types Of VIRUS.
Methods Of Detecting Virus By ANTI-VIRUS.
Prevention.
COMPUTER VIRUS:
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and run against your wish.
OR
A virus is illegal computer code that can do such things as alter programs or
destroy data. Also, the virus can copy itself onto programs, thereby spreading
its damaging effects.
Similarities between biological virus
and computer virus:
Computer virus are called viruses because they share some of the traits of biological
Viruses. A computer virus passed from computer to computer like a biological virus
Passes from person to person
• Need a host for residence.
• Capable of self-replicate.
• Cause damage to host.
How Does A VIRUS Spread?
 first the virus is linked to the host object in such a
way that it activates when the host
object is used.
 Second virus looks for other suitable carrier
objects and attaches itself to them.
 With this dependency virus slows down the system.
How does a virus work?
The virus waits until user transmits the
infected object to another computer
User transmits an infected object to another
computer
The virus locates and infects suitable objects
on the new computer
VIRUS
ANTI-
DETECTIN
ROUTINES
COPY
SEARCH
TYPES OF VIRUS
MACRO VIRUS.
BOOT SECTOR VIRUS.
WORMS.
TROJEN HORSES.
LOGIC BOMBS.
MACRO VIRUS:
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded into
main memory and destroys the data
stored in hard disk.
BOOT SECTOR VIRUS
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
WORMS
A worm is also a destructive program
that fills a computer system with self-
replicating information.
Types of WORMS VIRUS:
MAIL WORM
PURE WORM
TROJAN HORSE
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
LOGICAL BOMBS
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
OTHERS
Time Bomb
Script Virus
Directory Virus
Signature-Based Detection-Compare the
contents of a file to a dictionary of virus.
Behavior -Based Detection:
Observe how the program execute in the computer
Rather than looking for signature .
Check the suspicious file and show warnings to the
user.
Heuristic -Based Detection:
 Detect and remove all threats.
 Create a generic signature.
PREVENTION
 Don't share Drive C: without a password and
without read-only restrictions.
 Use Anti-Virus.
 Delete e-mail file attachments.
 Have multiple backups of important files.
 More secure operating systems
e.g. UNIX
ANY
QUESTION
THANK YOU

More Related Content

What's hot

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
ainizbahari97
 

What's hot (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 

Viewers also liked (12)

PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
 
Internal components of the computer
Internal components of the computerInternal components of the computer
Internal components of the computer
 
Computer Generation Presentation
Computer Generation PresentationComputer Generation Presentation
Computer Generation Presentation
 
GENERATIONS OF COMPUTER
GENERATIONS OF COMPUTERGENERATIONS OF COMPUTER
GENERATIONS OF COMPUTER
 
Computer Systems - Input, Process, Output
Computer Systems - Input, Process, OutputComputer Systems - Input, Process, Output
Computer Systems - Input, Process, Output
 
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Computer presentation
Computer presentationComputer presentation
Computer presentation
 
Basic concept of management
Basic concept of managementBasic concept of management
Basic concept of management
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to presentation on computer virus

How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Imran Khan
 

Similar to presentation on computer virus (20)

Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Virus
VirusVirus
Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer vrise
Computer vriseComputer vrise
Computer vrise
 

Recently uploaded

Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

presentation on computer virus

  • 1.
  • 2. CONTENTS INTRODUCTION. Similarities B/w Biological & Computer Virus. How Does A Virus Work? Life Cycle Of Computer Virus. Functional Diagram of VIRUS. Types Of VIRUS. Methods Of Detecting Virus By ANTI-VIRUS. Prevention.
  • 3. COMPUTER VIRUS: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and run against your wish. OR A virus is illegal computer code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
  • 4. Similarities between biological virus and computer virus: Computer virus are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person • Need a host for residence. • Capable of self-replicate. • Cause damage to host.
  • 5. How Does A VIRUS Spread?  first the virus is linked to the host object in such a way that it activates when the host object is used.  Second virus looks for other suitable carrier objects and attaches itself to them.  With this dependency virus slows down the system. How does a virus work?
  • 6. The virus waits until user transmits the infected object to another computer User transmits an infected object to another computer The virus locates and infects suitable objects on the new computer
  • 8. TYPES OF VIRUS MACRO VIRUS. BOOT SECTOR VIRUS. WORMS. TROJEN HORSES. LOGIC BOMBS.
  • 9. MACRO VIRUS: A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk.
  • 10. BOOT SECTOR VIRUS A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 11. WORMS A worm is also a destructive program that fills a computer system with self- replicating information. Types of WORMS VIRUS: MAIL WORM PURE WORM
  • 12. TROJAN HORSE Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 13. LOGICAL BOMBS A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 15. Signature-Based Detection-Compare the contents of a file to a dictionary of virus.
  • 16. Behavior -Based Detection: Observe how the program execute in the computer Rather than looking for signature . Check the suspicious file and show warnings to the user.
  • 17. Heuristic -Based Detection:  Detect and remove all threats.  Create a generic signature.
  • 18. PREVENTION  Don't share Drive C: without a password and without read-only restrictions.  Use Anti-Virus.  Delete e-mail file attachments.  Have multiple backups of important files.  More secure operating systems e.g. UNIX