COMPUTER
VIRUSES
Presented by:

Aditi Ambekar
Angela Mary Binoy
Annies Minu SathiyaSeelan
SICK OF COMPUTER
VIRUSES?

What they are…
Where they come from…
Why they are here…
Index
1. History

2.Concept
3. Symptoms
4. Types Of Infections
6. Types Of Viruses
7.Conclusion
• The first computer virus was
called “Creeper.”It was
invented in the early
1970’s.Since then, millions of
viruses have b...
Virus +

DEATH
• A Computer Virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user...
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Rand...
Malware

Viruses

Worms

Trojan
Horses
1.
2.
3.
4.
5.
6.
7.
8.

Boot Sector Virus.
Direct Action Virus.
File Infector Virus.
Macro Virus.
Multipartite Virus.
Pol...
It places its own codes
and commands into
MBR.
Alters the search and
error page of a
browser and redirects
the user to its own
page.
•They load with the host program into
computer’s memory.
•They can be crafted with relative ease.
File Infector Virus
A file infector is a virus that infects an
executable file.

Typically affects only one type of file.
Macro Virus
• These type of virus infects word , excel,
PowerPoint, access and other data files.
Once infected repairing o...
• May attack in more than one methods.
• A virus that can
encrypt its code in
different ways so
that it appears
differently in each
infection. These
viruses are ...
•
•
•
•

Hides within the computers memory.
It activates whenever the OS loads or operates.
This virus may be pernicious.
...
There are few website that execute complex
code with the purpose to provide interesting
content ,these codes often get exp...
Infects computers running with
Microsoft Windows.
Discovered by IT security firm Seculert,
in December 2012.
Steals confid...
In 2012, a major ransom ware worm known as
Reveton began to spread.
A Reveton is a malware which attempts to
extort money ...
Encrypting ransom ware appeared in 2013 with
a worm known as "Crypto Locker”.
It gets Distributed either as an attachment ...
THANK YOU!
Computer Viruses
Computer Viruses
Computer Viruses
Computer Viruses
Computer Viruses
Upcoming SlideShare
Loading in...5
×

Computer Viruses

4,662

Published on

Types of Viruses and its Prevention

Published in: Education, Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
4,662
On Slideshare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
508
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Computer Viruses

  1. 1. COMPUTER VIRUSES Presented by: Aditi Ambekar Angela Mary Binoy Annies Minu SathiyaSeelan
  2. 2. SICK OF COMPUTER VIRUSES? What they are… Where they come from… Why they are here…
  3. 3. Index 1. History 2.Concept 3. Symptoms 4. Types Of Infections 6. Types Of Viruses 7.Conclusion
  4. 4. • The first computer virus was called “Creeper.”It was invented in the early 1970’s.Since then, millions of viruses have been invented. • The first known computer virus was written in 1981 by a man named Rich Skrenta . This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  5. 5. Virus + DEATH
  6. 6. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file...
  7. 7. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Extensive pop-up ads. • Inability to open files with existing passwords.
  8. 8. Malware Viruses Worms Trojan Horses
  9. 9. 1. 2. 3. 4. 5. 6. 7. 8. Boot Sector Virus. Direct Action Virus. File Infector Virus. Macro Virus. Multipartite Virus. Polymorphic Virus. Resident Virus. Web Scripting Virus.
  10. 10. It places its own codes and commands into MBR.
  11. 11. Alters the search and error page of a browser and redirects the user to its own page.
  12. 12. •They load with the host program into computer’s memory. •They can be crafted with relative ease.
  13. 13. File Infector Virus A file infector is a virus that infects an executable file. Typically affects only one type of file.
  14. 14. Macro Virus • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  15. 15. • May attack in more than one methods.
  16. 16. • A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
  17. 17. • • • • Hides within the computers memory. It activates whenever the OS loads or operates. This virus may be pernicious. It is of 2 types: Fast Infector. Slow Infector. • Removal of this virus is bit tricky. • It may be designed to block the actions of Anti Virus programs.
  18. 18. There are few website that execute complex code with the purpose to provide interesting content ,these codes often get exploited and due to this a virus becomes able to infect a machine and to take actions on a machine via website. This particular virus is called web scripting virus
  19. 19. Infects computers running with Microsoft Windows. Discovered by IT security firm Seculert, in December 2012. Steals confidential data of the user. Affects POS i.e. Point of sales. Detected in online banking transaction space on 19 January 2014 in India.
  20. 20. In 2012, a major ransom ware worm known as Reveton began to spread. A Reveton is a malware which attempts to extort money from a user. It claims that your computer has been used for unauthorized activities.
  21. 21. Encrypting ransom ware appeared in 2013 with a worm known as "Crypto Locker”. It gets Distributed either as an attachment to a malicious e-mail or as a drive-by download. CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key. CryptoLocker to be extremely difficult to repair.
  22. 22. THANK YOU!
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×