SlideShare a Scribd company logo
1 of 19
STUDENT’S SEMINAR
INTRODUCTION
DEFINITION:
A computer virus is a program or code that attaches itself to a
legitimate, executable piece of software, and then reproduces
itself when that program is run.
•In 1949, John von Neumann gave "self altering automata theory" which
is the result of mathematical research .
•In 1960, experts in BELL lab created a program that can reproduce itself
and can destroy the artificial opponent. Programs that are able to survive
and destroy all other programs, will be considered the winner. This game
ended up being a favourite game in each computer lab.
•In 1980, programs that eventually known as "virus" was successfully
spread beyond the laboratory environment, and began circulating in the
general population.
WHAT IS THE NEED?
Malware is not used just to annoy users, but to steal their
passwords, banking and credit card details, entangle
them in scams and fraud, etc., all things that can have
serious financial consequences.
“Kaspersky Labs” made a study and found that:
There were 5,903,377 registered notifications about
attempted malware infections aiming at stealing money
via online access to bank accounts.
How does the Virus spread?
Virus can infect your computer via emails and files
downloaded from the Internet or copied from USB drives or
other computers. Hackers can also take advantage of
software vulnerabilities to remotely install virus on your
computer without your awareness.
How to recognize the presence of virus?
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard-disk runs out of space.
• The computer does not boot.
• Antivirus and firewall are disabled automatically.
• Unusual messages on screen!
• This type of virus infects the Master Boot
Record (MBR) of a hard drive, or the Floppy
Boot Record (FBR) of a floppy drive and virus
runs each time the system boots.
Boot Viruses
• A polymorphic virus creates an infection in a
computer that is known as a polymorphic
infection that creates copies of itself, with
each copy different to fool a virus detection
and users.
Polymorphic
Viruses
• A MAC or Macro virus is a computer virus
that spreads to other computers
through software programs that utilize
macros. For example, Microsoft
Word and Microsoft Excel.
Macro Viruses
BOOT VIRUS
A boot virus (also known as a boot infector or an MBR) targets and infects a
specific, physical section of a computer system that contains information
crucial to the proper operation of the computer's operating system (OS).
Boot viruses may differ based on whether they target the MBR or the FBR.
Infection Overview:
Step -1: Write original boot sector elsewhere on the disk.
Step-2:Write virus to the boot sector.
POLYMORPHIC VIRUS
• A polymorphic virus might have a virus decryption routine (VDR) and an
encrypted virus program body (EVB). When an infected application
launches, the VDR decrypts the encrypted virus body EVB back to its
original form so the virus can perform its intended function.
• Polymorphic viruses change their code each time as they duplicate
themselves.
• In this way each new copy is a variation of older copy!
MACRO VIRUS
• In computing terminology, a macro virus is a virus that is
written in a macro language : that is to say, a programming
language which is embedded inside a software application.
• Macros are sets of instructions that can be triggered by a
single command.
• Macro viruses are most commonly associated with Microsoft
Office programs (such as Word, Excel or Access) as these are
the most promptly used documents.
• The Melissa (created by David L. Smith) virus from March 1999 is a good
example of how viruses inflict damage. Melissa lurked inside an e-mail
Microsoft Word attachment. The e-mail's subject line appeared to be from
someone the recipient recognized.
• However, once the recipient clicked on the attachment, Melissa fused itself
to a Word object and began rifling through the victim's address book.
MISCONCEPTION
Worms, Viruses, Trojans are all part of a class of software called
malware , but they are not the same thing.
WORMS
• Stand Alone and
do not need a
software to hide
in.
• Use computer
networks to send
malicious
software to
other
computers,
spreading from
computer to
computer.
VIRUS
• A computer virus
inserts a copy of
itself into and
becoming part of
another program.
• They replicate
themselves, and
most come
attached to an
executable file,
which means a
person has to
actually run the
program for the
virus to become
active and spread.
TROJANS
• It is a harmful
piece of software
that looks
legitimate
• People are
tricked into using
such software.
• Trojan Horses do
not replicate
themselves the
way viruses and
worms do.
ANTI-VIRUS
• An antivirus software is a computer program that
identify and remove computer viruses, and other
malicious software like Worms and Trojans from
an infected computer. Not only this, an antivirus
software also protects the computer from further
virus attacks.
• There are two basic approaches used by Antivirus:
1. Dictionary Approach
2. Suspicious Behavior Approach
USING DICTIONARY APPROACH:
• The antivirus software examines each and every file in a
computer and examines its content with the virus definitions
stored in its virus dictionary.
• A virus dictionary is an inbuilt file belonging to an antivirus
software that contains code identified as a virus by the
antivirus authors.
Using Suspicious Behavior Approach:
•Antivirus software constantly monitors the activity of all
the programs.
•If any program tries to write data on an executable file, the
antivirus software will flag the program having a suspicious
behavior, means the suspected program will be marked as
a virus.
•The advantage of this approach is that it can safeguard
the computer against unknown viruses also.
•The disadvantage is that it may create several false alerts
too.
Source: www.techspot.com
What one can do to be safe?
• Turn on your firewall.
• Use Windows Defender.
• Install and utilize anti-virus software, and be sure to update it as
necessary.
• Utilize an anti-malware program.
• Don’t click on anything you aren’t sure about. If something seems
suspicious, chances are it is.
• Back up your computer, and do it often! Protect yourself in case the
worst happens.
Virus-Awareness

More Related Content

What's hot (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Intro To Programming Concepts
Intro To Programming ConceptsIntro To Programming Concepts
Intro To Programming Concepts
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Programming
ProgrammingProgramming
Programming
 
Worm
WormWorm
Worm
 

Viewers also liked

MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservicesMediaMosa
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminarSai Ram
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technologyguest5fd01d
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (13)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Computer security 101
Computer security 101Computer security 101
Computer security 101
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Virus-Awareness

Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxDEEP TIWARI
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 

Similar to Virus-Awareness (20)

Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Virus
VirusVirus
Virus
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Virus-Awareness

  • 2. INTRODUCTION DEFINITION: A computer virus is a program or code that attaches itself to a legitimate, executable piece of software, and then reproduces itself when that program is run. •In 1949, John von Neumann gave "self altering automata theory" which is the result of mathematical research . •In 1960, experts in BELL lab created a program that can reproduce itself and can destroy the artificial opponent. Programs that are able to survive and destroy all other programs, will be considered the winner. This game ended up being a favourite game in each computer lab. •In 1980, programs that eventually known as "virus" was successfully spread beyond the laboratory environment, and began circulating in the general population.
  • 3. WHAT IS THE NEED? Malware is not used just to annoy users, but to steal their passwords, banking and credit card details, entangle them in scams and fraud, etc., all things that can have serious financial consequences. “Kaspersky Labs” made a study and found that: There were 5,903,377 registered notifications about attempted malware infections aiming at stealing money via online access to bank accounts.
  • 4. How does the Virus spread? Virus can infect your computer via emails and files downloaded from the Internet or copied from USB drives or other computers. Hackers can also take advantage of software vulnerabilities to remotely install virus on your computer without your awareness.
  • 5. How to recognize the presence of virus? • The computer system becomes slow. • The size of available free memory reduces. • The hard-disk runs out of space. • The computer does not boot. • Antivirus and firewall are disabled automatically. • Unusual messages on screen!
  • 6. • This type of virus infects the Master Boot Record (MBR) of a hard drive, or the Floppy Boot Record (FBR) of a floppy drive and virus runs each time the system boots. Boot Viruses • A polymorphic virus creates an infection in a computer that is known as a polymorphic infection that creates copies of itself, with each copy different to fool a virus detection and users. Polymorphic Viruses • A MAC or Macro virus is a computer virus that spreads to other computers through software programs that utilize macros. For example, Microsoft Word and Microsoft Excel. Macro Viruses
  • 7. BOOT VIRUS A boot virus (also known as a boot infector or an MBR) targets and infects a specific, physical section of a computer system that contains information crucial to the proper operation of the computer's operating system (OS). Boot viruses may differ based on whether they target the MBR or the FBR. Infection Overview: Step -1: Write original boot sector elsewhere on the disk. Step-2:Write virus to the boot sector.
  • 8. POLYMORPHIC VIRUS • A polymorphic virus might have a virus decryption routine (VDR) and an encrypted virus program body (EVB). When an infected application launches, the VDR decrypts the encrypted virus body EVB back to its original form so the virus can perform its intended function. • Polymorphic viruses change their code each time as they duplicate themselves. • In this way each new copy is a variation of older copy!
  • 9. MACRO VIRUS • In computing terminology, a macro virus is a virus that is written in a macro language : that is to say, a programming language which is embedded inside a software application. • Macros are sets of instructions that can be triggered by a single command. • Macro viruses are most commonly associated with Microsoft Office programs (such as Word, Excel or Access) as these are the most promptly used documents.
  • 10. • The Melissa (created by David L. Smith) virus from March 1999 is a good example of how viruses inflict damage. Melissa lurked inside an e-mail Microsoft Word attachment. The e-mail's subject line appeared to be from someone the recipient recognized. • However, once the recipient clicked on the attachment, Melissa fused itself to a Word object and began rifling through the victim's address book.
  • 11. MISCONCEPTION Worms, Viruses, Trojans are all part of a class of software called malware , but they are not the same thing.
  • 12. WORMS • Stand Alone and do not need a software to hide in. • Use computer networks to send malicious software to other computers, spreading from computer to computer. VIRUS • A computer virus inserts a copy of itself into and becoming part of another program. • They replicate themselves, and most come attached to an executable file, which means a person has to actually run the program for the virus to become active and spread. TROJANS • It is a harmful piece of software that looks legitimate • People are tricked into using such software. • Trojan Horses do not replicate themselves the way viruses and worms do.
  • 13. ANTI-VIRUS • An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. • There are two basic approaches used by Antivirus: 1. Dictionary Approach 2. Suspicious Behavior Approach
  • 14. USING DICTIONARY APPROACH: • The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. • A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 15. Using Suspicious Behavior Approach: •Antivirus software constantly monitors the activity of all the programs. •If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus. •The advantage of this approach is that it can safeguard the computer against unknown viruses also. •The disadvantage is that it may create several false alerts too.
  • 17.
  • 18. What one can do to be safe? • Turn on your firewall. • Use Windows Defender. • Install and utilize anti-virus software, and be sure to update it as necessary. • Utilize an anti-malware program. • Don’t click on anything you aren’t sure about. If something seems suspicious, chances are it is. • Back up your computer, and do it often! Protect yourself in case the worst happens.

Editor's Notes

  1. The word virus is often being used as a common term for all malicious programs, but technically
  2. USB drive is the second common way to distribute virus. When you insert your USB drive to a computer you may have no idea that there are several viruses hiding in the computer to enter that USB memory stick which then become a vehicle for the virus to take shelter in your own computer.
  3. http://userpages.umbc.edu/~dgorin1/432/viruses.htm The MBR is the first sector of a hard drive and is usually located on track 0. It contains the initial loader and information about partition tables on a hard disk. The DBR is usually located a few sectors (62 sectors after on a hard disk with 63 sectors per track) after the MBR, and contains the initial loader for an operating system and logical drive information. The FBR is use for the same purposes as DBR on a hard drive, but it is located on the first track of a diskette. Though boot viruses were once more common in the early 90s, they have since become less of a threat, as most computer motherboards now provide protection against such threats by denying access to the MBR without user permission. In recent years however, more sophisticated malware has been developed that have begin retargeting the MBR 
  4. https://www.youtube.com/watch?v=y8a3QoTg4VQ
  5. www.techspot.com