0
ANTI VIRUS !! BY : NOOR SHAFIQAH BT NOOR SHAM
COMPUTER VIRUS <ul><li>A computer virus is a  computer program  that can copy itself and infect a computer without permiss...
VIRUS <ul><li>The original may modify the copies or the copies may modify themselves, as occurs in a  metamorphic virus . ...
WHY PEOPLE CREATE COMPUTER VIRUSES?? <ul><li>They are deliberately created by programmers, or by people who use virus crea...
VECTORS  &  HOST <ul><li>Viruses have targeted various types of transmission media or hosts. This list is not exhaustive: ...
METHODS TO AVOID DETECTION <ul><li>Some viruses can infect files without increasing their sizes or damaging the files. The...
ANTI VIRUS SOFTWARE <ul><li>Antivirus software consists of  computer programs  that attempt to identify, thwart and elimin...
CONCLUSION <ul><li>Once a computer has been compromised by a virus, it is usually unsafe to continue using the same comput...
<ul><li>THANK  </li></ul><ul><li>YOU!!   </li></ul>
Upcoming SlideShare
Loading in...5
×

Antivirus!!

1,618

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,618
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
137
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Antivirus!!"

  1. 1. ANTI VIRUS !! BY : NOOR SHAFIQAH BT NOOR SHAM
  2. 2. COMPUTER VIRUS <ul><li>A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. </li></ul>
  3. 3. VIRUS <ul><li>The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus . A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk , CD , USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that iViruses are sometimes confused with computer worms and Trojan horses . A worm, however, can spread itself to other computers without needing to be transferred as part of a host. s accessed by another computer. </li></ul>
  4. 4. WHY PEOPLE CREATE COMPUTER VIRUSES?? <ul><li>They are deliberately created by programmers, or by people who use virus creation software. Computer viruses can only do what the programmers have programmed them to do. </li></ul><ul><li>Viruses have been written as research projects, pranks, vandalism , to attack the products of specific companies, to distribute political messages, and financial gain from identity theft , spyware , and cryptoviral extortion . Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. Additionally, many virus writers oppose deliberately destructive payload routines. </li></ul>
  5. 5. VECTORS & HOST <ul><li>Viruses have targeted various types of transmission media or hosts. This list is not exhaustive: </li></ul><ul><li>Binary executable files (such as COM files and EXE files in MS-DOS , Portable Executable files in Microsoft Windows , and ELF files in Linux) </li></ul><ul><li>Volume Boot Records of floppy disks and hard disk partitions </li></ul><ul><li>The master boot record (MBR) of a hard disk </li></ul><ul><li>General-purpose script files (such as batch files in MS-DOS and Microsoft Windows , VBScript files, and shell script files on Unix-like platforms). </li></ul><ul><li>Application-specific script files (such as Telix -scripts) </li></ul><ul><li>Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft Access database files) </li></ul><ul><li>Cross-site scripting vulnerabilities in web applications </li></ul>
  6. 6. METHODS TO AVOID DETECTION <ul><li>Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus , or Chernobyl Virus , infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file. </li></ul>
  7. 7. ANTI VIRUS SOFTWARE <ul><li>Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software ( malware ). </li></ul><ul><li>Antivirus software typically uses two different techniques to accomplish this: </li></ul><ul><li>Examining (scanning) files to look for known viruses matching definitions in a virus dictionary </li></ul><ul><li>Identifying suspicious behavior from any computer program which might indicate infection. Such analysis may include data captures, port monitoring and other methods. </li></ul>
  8. 8. CONCLUSION <ul><li>Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus depend on severity of the type of virus. </li></ul>
  9. 9. <ul><li>THANK </li></ul><ul><li>YOU!! </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×