SlideShare a Scribd company logo
1 of 29
1
Computer security Against
threats
A presentation by Vishwaraj Yadav
and Saurav Mohapatra of class 11th
Cannas
2
Contents
• Security of computer
• Threats to computer security
• Solutions to computer threats
Security of system
• Nowadays, Computers are used
everywhere. Various data is shared
from one computer to another. But
sometimes the data is not trustworthy,
or it behaves in an undesired manner. If
this happens then our computer is
insecure.
3
Continued….
• So to make our computer secured we
need Computer security.
• It is the ability of computer to protect
information & system resources with
respect to confidentiality & integrity.
4
• A threat is a potential violation to
security. When it is executed it becomes
attack.
5
Threats to computer
security
6
Threats to computer
security
PC
Intrusion
Spyware Adware Spamming Viruses
Worms
Trojans
Phishing
7
Computer Virus
• Viruses are malicious codes that cause
damage to data, they can attack to any
part of computer’s software such as boot
block, files & application programs etc.
• Worms & Trojan horses are similar
programs having virus-like effects.
Computer Virus
• Worms- A self-replicating program
which eats up the entire disk space or
memory.
• Trojan Horses- It is a program which
appears harmless but performs
malicious functions such as deleting or
damaging files.
8
Computer Virus
• How do viruses damage computer?
1. They damage or delete files.
2. Slow down the computer.
3. Invade your email program.
9
10
Computer
Viruses
Boot sector
viruses
File
viruses
Macro
viruses
Multipartite
viruses
Polymorph
ic viruses
11
Computer Virus
Types of Computer Virus
• Boot Sector Virus
Boot sector viruses infect the boot sectors on floppy
disks and hard disks, and can also infect the master
boot record on a user's hard drive.
• File Virus
Operate in memory and usually infect executable files.
• Polymorphic virus
They mutate their own code to make it difficult for
antivirus to detect and remove.
Computer Virus
• Multi-partite Virus
Multi-partite viruses have characteristics
of both boot sector viruses and file
infector viruses.
• Macro Virus
They infect macro utilities that accompany
such applications as Microsoft Word,
Excel and outlook.
12
13
Example of computer virus
I LOVE YOU
• VBS/LoveLetter is a VBScript worm. It
spreads through e-mail as a chain letter.
• This worm sends itself to email addresses in
the Microsoft Outlook address book and also
spreads to Internet chatrooms.
• This worm overwrites files on local and
remote drives, including files with the
extensions .html, .c,.bat,.mp3 etc.
spyware
• Spyware is a software which is installed
in the computer to spy on the activities
done on the computer.
• It tracks what all user does and reports
it to the central source. They are used
to spy either for legal purpose or illegal
purpose.
14
Spyware
15
spyware
• How do spyware cause damage?
1. They monitor information such as what
sites you visit or record keystrokes
which can lead to identity thefts.
2. Some spywares alter PC settings like
position of your desktop icons etc.
3. It can rob the PC of system speed and
internet access efficiency.
16
Adware
• These are programs that deliver
unwanted ads to computer(in the form
of pop-ups).
17
Adware
• How do adware damage computer?
1. Adware tracks the information just like
spyware.
2. When adware infects the computer, we
will receive frequent pop-ups
appearing out of nowhere.
3. The appearing of large number of ads
,the PC starts to slow down.
18
Spamming
• Spamming refers to sending of bulk-
mail by an identified or unidentified
source. The attacker keeps on sending
bulk mail to various accounts until mail
server runs out of disk space.
19
Spamming
• How do spams damage computer?
1. Spam messages circulating across
internet disrupt email delivery & system
performance.
2. Spams eats up time.
3. Spam messages contain fraud material
and can even spread viruses.
20
PC Intrusion
• Every PC connected to Internet are
target of hackers. Hackers constantly
attack computers.
21
PC Intrusion
• How can it damage the system?
1. Sweeper attack- Hackers use it to
delete all the data in the system.
2. Denial of service- Thais attack eats up
all the resources of system and system
or application doesn’t work.
3. Password guessing- Hackers crack or
guess passwords of account to gain
entry into remote computer systems.
22
Solutions to computer
threats
• The computer security protects the
computer through threats by taking
actions or taking prevention. There are
two solutions to these threats-
1. Active Protection
2. Preventive Maesures
23
Continued…
• Active Protection- Installing and using
antivirus that includes Internet security-
which includes protection against
viruses, spyware & PC intrusion.
• Preventive measures- Even though
security programs detect & eliminate
threats but we should help prevent
these issues from ever arising.
24
Continued…
• Solutions to viruses, adware,spyware
1. Active protection
• Use Anti-virus and Anti-spyware
software.
• Download updates regularly.
• Run frequent full-system scans.
25
2. Preventive measures
• Keep your system up-to-date.
• Use caution when downloading files on
the internet.
• Be careful with email.
• Disable Cookies, if possible.
26
Continued…
• Solutions to Spam
1. Active Protection:-Methods used by
anti-spam software-
(a)Sender Filtering
Digital Certificates
Digital Signatures
(b)Keyword Filtering
27
Continued…
Solutions to PC intrusion:-
Authorization
Authentication
Firewall
28
Continued…
29

More Related Content

What's hot

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and AntivirusBordaArka
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagarNitish Nagar
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 

What's hot (20)

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Software theft
Software theftSoftware theft
Software theft
 
Virus and Antivirus
Virus and AntivirusVirus and Antivirus
Virus and Antivirus
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer security
Computer securityComputer security
Computer security
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
What is malware
What is malwareWhat is malware
What is malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Virus
VirusVirus
Virus
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Ppt123
Ppt123Ppt123
Ppt123
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 

Viewers also liked

Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Software testing - basics
Software testing - basicsSoftware testing - basics
Software testing - basicsPrasad Gali
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusMarie Jaja Tan Roa
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Applications of Artificial Intelligence
Applications of Artificial IntelligenceApplications of Artificial Intelligence
Applications of Artificial IntelligenceMehr Un Nisa Manjotho
 
The different kind of programming language
The  different kind of programming languageThe  different kind of programming language
The different kind of programming languageMd Amran
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its applicationMohammed Abdel Razek
 
CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)Dilawar Khan
 
artificial intelligence and its applications
 artificial intelligence and its applications artificial intelligence and its applications
artificial intelligence and its applicationsYogendra Vishnoi
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and softwareKarl John Piocos
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computersnorzaini
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 

Viewers also liked (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Chapter iv computer virus
Chapter iv  computer virusChapter iv  computer virus
Chapter iv computer virus
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Software testing - basics
Software testing - basicsSoftware testing - basics
Software testing - basics
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Panganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at VirusPanganib na Dulot ng Computer Malware at Virus
Panganib na Dulot ng Computer Malware at Virus
 
Presentation on java
Presentation  on  javaPresentation  on  java
Presentation on java
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Applications of Artificial Intelligence
Applications of Artificial IntelligenceApplications of Artificial Intelligence
Applications of Artificial Intelligence
 
The different kind of programming language
The  different kind of programming languageThe  different kind of programming language
The different kind of programming language
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its application
 
CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)CS3270 - DATABASE SYSTEM - Lecture (2)
CS3270 - DATABASE SYSTEM - Lecture (2)
 
artificial intelligence and its applications
 artificial intelligence and its applications artificial intelligence and its applications
artificial intelligence and its applications
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Chapter 1 Introduction To Computers
Chapter 1 Introduction To ComputersChapter 1 Introduction To Computers
Chapter 1 Introduction To Computers
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 

Similar to Computer virus-and-antivirus

Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber securityBansari Shah
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 

Similar to Computer virus-and-antivirus (20)

Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Malicious
MaliciousMalicious
Malicious
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
computer security
computer securitycomputer security
computer security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 

Recently uploaded

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Computer virus-and-antivirus

  • 1. 1 Computer security Against threats A presentation by Vishwaraj Yadav and Saurav Mohapatra of class 11th Cannas
  • 2. 2 Contents • Security of computer • Threats to computer security • Solutions to computer threats
  • 3. Security of system • Nowadays, Computers are used everywhere. Various data is shared from one computer to another. But sometimes the data is not trustworthy, or it behaves in an undesired manner. If this happens then our computer is insecure. 3
  • 4. Continued…. • So to make our computer secured we need Computer security. • It is the ability of computer to protect information & system resources with respect to confidentiality & integrity. 4
  • 5. • A threat is a potential violation to security. When it is executed it becomes attack. 5 Threats to computer security
  • 6. 6 Threats to computer security PC Intrusion Spyware Adware Spamming Viruses Worms Trojans Phishing
  • 7. 7 Computer Virus • Viruses are malicious codes that cause damage to data, they can attack to any part of computer’s software such as boot block, files & application programs etc. • Worms & Trojan horses are similar programs having virus-like effects.
  • 8. Computer Virus • Worms- A self-replicating program which eats up the entire disk space or memory. • Trojan Horses- It is a program which appears harmless but performs malicious functions such as deleting or damaging files. 8
  • 9. Computer Virus • How do viruses damage computer? 1. They damage or delete files. 2. Slow down the computer. 3. Invade your email program. 9
  • 11. 11 Computer Virus Types of Computer Virus • Boot Sector Virus Boot sector viruses infect the boot sectors on floppy disks and hard disks, and can also infect the master boot record on a user's hard drive. • File Virus Operate in memory and usually infect executable files. • Polymorphic virus They mutate their own code to make it difficult for antivirus to detect and remove.
  • 12. Computer Virus • Multi-partite Virus Multi-partite viruses have characteristics of both boot sector viruses and file infector viruses. • Macro Virus They infect macro utilities that accompany such applications as Microsoft Word, Excel and outlook. 12
  • 13. 13 Example of computer virus I LOVE YOU • VBS/LoveLetter is a VBScript worm. It spreads through e-mail as a chain letter. • This worm sends itself to email addresses in the Microsoft Outlook address book and also spreads to Internet chatrooms. • This worm overwrites files on local and remote drives, including files with the extensions .html, .c,.bat,.mp3 etc.
  • 14. spyware • Spyware is a software which is installed in the computer to spy on the activities done on the computer. • It tracks what all user does and reports it to the central source. They are used to spy either for legal purpose or illegal purpose. 14
  • 16. spyware • How do spyware cause damage? 1. They monitor information such as what sites you visit or record keystrokes which can lead to identity thefts. 2. Some spywares alter PC settings like position of your desktop icons etc. 3. It can rob the PC of system speed and internet access efficiency. 16
  • 17. Adware • These are programs that deliver unwanted ads to computer(in the form of pop-ups). 17
  • 18. Adware • How do adware damage computer? 1. Adware tracks the information just like spyware. 2. When adware infects the computer, we will receive frequent pop-ups appearing out of nowhere. 3. The appearing of large number of ads ,the PC starts to slow down. 18
  • 19. Spamming • Spamming refers to sending of bulk- mail by an identified or unidentified source. The attacker keeps on sending bulk mail to various accounts until mail server runs out of disk space. 19
  • 20. Spamming • How do spams damage computer? 1. Spam messages circulating across internet disrupt email delivery & system performance. 2. Spams eats up time. 3. Spam messages contain fraud material and can even spread viruses. 20
  • 21. PC Intrusion • Every PC connected to Internet are target of hackers. Hackers constantly attack computers. 21
  • 22. PC Intrusion • How can it damage the system? 1. Sweeper attack- Hackers use it to delete all the data in the system. 2. Denial of service- Thais attack eats up all the resources of system and system or application doesn’t work. 3. Password guessing- Hackers crack or guess passwords of account to gain entry into remote computer systems. 22
  • 23. Solutions to computer threats • The computer security protects the computer through threats by taking actions or taking prevention. There are two solutions to these threats- 1. Active Protection 2. Preventive Maesures 23
  • 24. Continued… • Active Protection- Installing and using antivirus that includes Internet security- which includes protection against viruses, spyware & PC intrusion. • Preventive measures- Even though security programs detect & eliminate threats but we should help prevent these issues from ever arising. 24
  • 25. Continued… • Solutions to viruses, adware,spyware 1. Active protection • Use Anti-virus and Anti-spyware software. • Download updates regularly. • Run frequent full-system scans. 25
  • 26. 2. Preventive measures • Keep your system up-to-date. • Use caution when downloading files on the internet. • Be careful with email. • Disable Cookies, if possible. 26 Continued…
  • 27. • Solutions to Spam 1. Active Protection:-Methods used by anti-spam software- (a)Sender Filtering Digital Certificates Digital Signatures (b)Keyword Filtering 27 Continued…
  • 28. Solutions to PC intrusion:- Authorization Authentication Firewall 28 Continued…
  • 29. 29