Your SlideShare is downloading. ×
0
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Virusandantivirusfinalppt 110413033802-phpapp02 (1)

517

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
517
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
50
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. WELCOME st TO The 21 Century...Malware Rules The Environment Of Computer System
  2. We Are The Devils Of Your Computer System
  3. What Is Malware?● Malware is a software designed to harm or secretly access a computer system without the owners informed consent.● Malware, short for malicious software,also known as pestware.● In general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
  4. Types Of Malwares● Virus● Trojan Horse● Spyware● Adware● Rootkits● Crimeware● Scareware
  5. Lets Introduce The Common Ones... VIRUS:A computer virus is a small program written to alter theway a computer operates, without the permission orknowledge of the user. With an ability to replicate itself,thus continuing to spread. Also, known as MaliciousSoftware, a program that can cause damage to a computer.The computer viruses can damage or corrupt data, modifyexisting data, or degrade the performance of the system byutilizing resources such as memory or disk space. It mayspread over a network (internet), carried it on a removablemedium such as a Floppy disk, CD/DVD Drive, USB Drive.
  6. Classification of Computer viruses:•Boot sector virus•Master Boot Record (MBR) virus•File infector virus•Multipartite virus•Macro virus
  7. BOOT SECTOR VIRUS:Boot sector viruses generally hide in the boot sector,either in the bootable disk or the hard drive.It attaches itself to the primary active partition of the harddisk that is read by the computer upon boot up.MASTER BOOT RECORD VIRUS:MBR viruses are memory-resident viruses that infect disksin the same manner as boot sector viruses. However it,infects the MBR of the system, gets activated when theBIOS activates the Master boot code. MBR infectorsnormally save a legitimate copy of the master boot recordin an different location.
  8. File Infector Virus:File Infector viruses infect program files. Normally infectexecutable code, such as .COM, .SYS, .BAT and .EXE files.They can infect other files when an infected program is runfrom floppy, hard drive, or from the network. Many of theseviruses are memory resident. After memory becomesinfected, any uninfected executable file that runs becomesinfected.E.g. Snow.A, Jerusalem, Cascade.
  9. Macro Virus:Macro are mini-programs which make it possible toautomate series of operations so that they areperformed as a single action, thereby saving the userfrom having to carry them out one by one.Macro viruses infect files that are created using certainapplications or programs that contain macros.They are platform-independent since the virus itself arewritten in language of the application and not theoperating system.They infect documents created from Microsoft OfficeWord, Excel, PowerPoint and Access files.E.g.W97M.Melissa,Bablas,WM.NiceDay,W97M.Groov.
  10. Trojan HorseTrojan horses are impostors that claim to be somethingdesirable but, in fact, are malicious. Trojan horse programsdo not replicate themselves. Trojan horses containmalicious code that when triggered cause loss, or eventheft, of data.E.g. Trojan.VundoRetrieving user’s critical information. i.e. name, password.Erasing or overwriting data on a computer.Spying on a user to gather his information like browsinghabits, sites visited etc.
  11. WORMSWorms are programs that replicate themselves fromsystem to system without the use of a host file. The wormsare spread through networks like LAN, WAN and alsothrough Internet. There are various ways by which a wormspreads, through Internet like E-mails, Messaging andChats.Worms almost always cause harm to the network, likeconsuming network bandwidth.E.g.W32.Mydoom.AX@mm
  12. SPYWARE:It is a type of malware that can be installed on computers, andwhich collects small pieces of information about users withouttheir knowledge. The presence of spyware is typically hiddenfrom the user, and can be difficult to detect. Typically, spywareis secretly installed on the users personal computer.ADWARE:It is any software package which automatically plays, displays,or downloads advertisements to a computer. It is a type ofmalware which steals information. Example Bonzi Buddy, anapplication marketed as an "Intelligent Software Agent",corrupted many of the users system files, forcing the display ofmany obscene advertisements.
  13. Your Time Is Up, My Time Is Now....
  14. We Are The Angels Of Your Computer System. We Protect Your System Round The Clock
  15. ANTIVIRUSAn antivirus software is a computer program that identifyand remove computer viruses, and other malicioussoftware like Worms and Trojans from an infectedcomputer. Not only this, an antivirus software also protectsthe computer from further virus attacks.We should regularly run an antivirus program to scanand remove any possible virus attacks from a computer.
  16. Anti-spyware They can provide real time protection against theinstallation of spywares on the computer. This type ofspyware protection works the same way as that of anti-virus protection. It scans and blocks all incoming networkthreats as it comes across. It can be used solely for detection and removal ofspyware that has already been installed into thecomputer. Anti-spyware scans the contents of thewindows registry, operating system files, and installedprograms on the computer and will provide a list of anythreats found.
  17. How An Antivirus Works... Using dictionary Approach:• The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary.• A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  18. Using Suspicious Behavior Approach:•Antivirus software will constantly monitors the activity ofall the programs.•If any program tries to write data on an executable file, theantivirus software will flag the program having a suspiciousbehavior, means the suspected program will be marked asa virus.•The advantage of this approach is that it can safeguardthe computer against unknown viruses also.•The disadvantage is that it may create several false alertstoo.
  19. Virus UpdatesProviding regular updates for the virus dictionary.An antivirus program should provide free virus updates ona periodic basis.With the current outburst in macro and script-basedviruses, virus updates that address the latest threats areessential.Most commercial antivirus software in today’s scenarioprovide virus updates on daily basis.
  20. What to do on Suspecting Virus attack?•Disconnect the suspected computer system from theInternet as well as from the Local Network.•Start the system in Safe Mode or from the Windows bootdisk, if it displays any problem in starting.•Take backup of all crucial data to an external drive.•Install antivirus software if you do not have it installed.•Now, download the latest virus definitions updates fromthe internet.•Perform a full system scan.
  21. Virus found!!•Repair•Quarantine•Delete•Rename•Ignore
  22. Popular Anti-Virus And Anti-Spyware Softwares
  23. Anti-Virus & Anti-Spyware Is The Bodyguard Of Your System It Is Us Who Rules, Not Malwares Say No To

×