SlideShare a Scribd company logo
1 of 27
COMPUTER
VIRUSES
Presented by:

Aditi Ambekar
Angela Mary Binoy
Annies Minu SathiyaSeelan
SICK OF COMPUTER
VIRUSES?

What they are…
Where they come from…
Why they are here…
Index
1. History

2.Concept
3. Symptoms
4. Types Of Infections
6. Types Of Viruses
7.Conclusion
• The first computer virus was
called “Creeper.”It was
invented in the early
1970’s.Since then, millions of
viruses have been invented.
• The first known computer
virus was written in 1981 by a
man named Rich Skrenta . This
virus was termed Elk Cloner,
and was the first computer
virus to appear outside the
computer where it was
created in.
Virus +

DEATH
• A Computer Virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user.
• A Computer Virus has 2
major characteristics: the
ability to replicate itself, and
the ability to attach itself to
another computer file...
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
• Extensive pop-up ads.
• Inability to open files with existing passwords.
Malware

Viruses

Worms

Trojan
Horses
1.
2.
3.
4.
5.
6.
7.
8.

Boot Sector Virus.
Direct Action Virus.
File Infector Virus.
Macro Virus.
Multipartite Virus.
Polymorphic Virus.
Resident Virus.
Web Scripting Virus.
It places its own codes
and commands into
MBR.
Alters the search and
error page of a
browser and redirects
the user to its own
page.
•They load with the host program into
computer’s memory.
•They can be crafted with relative ease.
File Infector Virus
A file infector is a virus that infects an
executable file.

Typically affects only one type of file.
Macro Virus
• These type of virus infects word , excel,
PowerPoint, access and other data files.
Once infected repairing of these files is
very much difficult.
• May attack in more than one methods.
• A virus that can
encrypt its code in
different ways so
that it appears
differently in each
infection. These
viruses are more
difficult to detect.
•
•
•
•

Hides within the computers memory.
It activates whenever the OS loads or operates.
This virus may be pernicious.
It is of 2 types:
Fast Infector.
Slow Infector.
• Removal of this virus is bit tricky.
• It may be designed to block the actions of Anti
Virus programs.
There are few website that execute complex
code with the purpose to provide interesting
content ,these codes often get exploited and
due to this a virus becomes able to infect a
machine and to take actions on a machine via
website. This particular virus is called web
scripting virus
Infects computers running with
Microsoft Windows.
Discovered by IT security firm Seculert,
in December 2012.
Steals confidential data of the user.
Affects POS i.e. Point of sales.
Detected in online banking transaction
space on 19 January 2014 in India.
In 2012, a major ransom ware worm known as
Reveton began to spread.
A Reveton is a malware which attempts to
extort money from a user.
It claims that your computer has been used for
unauthorized activities.
Encrypting ransom ware appeared in 2013 with
a worm known as "Crypto Locker”.
It gets Distributed either as an attachment to a
malicious e-mail or as a drive-by download.
CryptoLocker demands a payment with either a
MoneyPak card or Bitcoin to recover the key.
CryptoLocker to be extremely difficult to repair.
THANK YOU!

More Related Content

What's hot

Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
Nikhi Jain
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
Vaibhav Bajaj
 

What's hot (20)

Operating systems
Operating systems Operating systems
Operating systems
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
 
Introduction to Windows
Introduction to WindowsIntroduction to Windows
Introduction to Windows
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Introduction to software
Introduction to softwareIntroduction to software
Introduction to software
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
computer software
computer softwarecomputer software
computer software
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
PPT on INPUT & OUTPUT DEVICES
PPT on INPUT & OUTPUT DEVICESPPT on INPUT & OUTPUT DEVICES
PPT on INPUT & OUTPUT DEVICES
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
COMPUTER HARDWARE AND SOFTWARE
COMPUTER HARDWARE AND SOFTWARECOMPUTER HARDWARE AND SOFTWARE
COMPUTER HARDWARE AND SOFTWARE
 
Computer security
Computer securityComputer security
Computer security
 

Similar to Computer Viruses

computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similar to Computer Viruses (20)

Virus
VirusVirus
Virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Proyecto7
Proyecto7Proyecto7
Proyecto7
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Malicious
MaliciousMalicious
Malicious
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
Malware
MalwareMalware
Malware
 
anti_virus
anti_virusanti_virus
anti_virus
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 

Computer Viruses

  • 1. COMPUTER VIRUSES Presented by: Aditi Ambekar Angela Mary Binoy Annies Minu SathiyaSeelan
  • 2. SICK OF COMPUTER VIRUSES? What they are… Where they come from… Why they are here…
  • 3. Index 1. History 2.Concept 3. Symptoms 4. Types Of Infections 6. Types Of Viruses 7.Conclusion
  • 4. • The first computer virus was called “Creeper.”It was invented in the early 1970’s.Since then, millions of viruses have been invented. • The first known computer virus was written in 1981 by a man named Rich Skrenta . This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 6. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file...
  • 7. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Extensive pop-up ads. • Inability to open files with existing passwords.
  • 9. 1. 2. 3. 4. 5. 6. 7. 8. Boot Sector Virus. Direct Action Virus. File Infector Virus. Macro Virus. Multipartite Virus. Polymorphic Virus. Resident Virus. Web Scripting Virus.
  • 10. It places its own codes and commands into MBR.
  • 11. Alters the search and error page of a browser and redirects the user to its own page.
  • 12. •They load with the host program into computer’s memory. •They can be crafted with relative ease.
  • 13. File Infector Virus A file infector is a virus that infects an executable file. Typically affects only one type of file.
  • 14. Macro Virus • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 15. • May attack in more than one methods.
  • 16. • A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
  • 17. • • • • Hides within the computers memory. It activates whenever the OS loads or operates. This virus may be pernicious. It is of 2 types: Fast Infector. Slow Infector. • Removal of this virus is bit tricky. • It may be designed to block the actions of Anti Virus programs.
  • 18. There are few website that execute complex code with the purpose to provide interesting content ,these codes often get exploited and due to this a virus becomes able to infect a machine and to take actions on a machine via website. This particular virus is called web scripting virus
  • 19.
  • 20.
  • 21. Infects computers running with Microsoft Windows. Discovered by IT security firm Seculert, in December 2012. Steals confidential data of the user. Affects POS i.e. Point of sales. Detected in online banking transaction space on 19 January 2014 in India.
  • 22.
  • 23. In 2012, a major ransom ware worm known as Reveton began to spread. A Reveton is a malware which attempts to extort money from a user. It claims that your computer has been used for unauthorized activities.
  • 24.
  • 25.
  • 26. Encrypting ransom ware appeared in 2013 with a worm known as "Crypto Locker”. It gets Distributed either as an attachment to a malicious e-mail or as a drive-by download. CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key. CryptoLocker to be extremely difficult to repair.