Your SlideShare is downloading. ×
0
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
presentation on computer virus
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

presentation on computer virus

6,842

Published on

Published in: Engineering, Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
6,842
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
606
Comments
0
Likes
5
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CONTENTS INTRODUCTION. Similarities B/w Biological & Computer Virus. How Does A Virus Work? Life Cycle Of Computer Virus. Functional Diagram of VIRUS. Types Of VIRUS. Methods Of Detecting Virus By ANTI-VIRUS. Prevention.
  • 2. COMPUTER VIRUS: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and run against your wish. OR A virus is illegal computer code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
  • 3. Similarities between biological virus and computer virus: Computer virus are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person • Need a host for residence. • Capable of self-replicate. • Cause damage to host.
  • 4. How Does A VIRUS Spread?  first the virus is linked to the host object in such a way that it activates when the host object is used.  Second virus looks for other suitable carrier objects and attaches itself to them.  With this dependency virus slows down the system. How does a virus work?
  • 5. The virus waits until user transmits the infected object to another computer User transmits an infected object to another computer The virus locates and infects suitable objects on the new computer
  • 6. VIRUS ANTI- DETECTIN ROUTINES COPY SEARCH
  • 7. TYPES OF VIRUS MACRO VIRUS. BOOT SECTOR VIRUS. WORMS. TROJEN HORSES. LOGIC BOMBS.
  • 8. MACRO VIRUS: A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk.
  • 9. BOOT SECTOR VIRUS A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 10. WORMS A worm is also a destructive program that fills a computer system with self- replicating information. Types of WORMS VIRUS: MAIL WORM PURE WORM
  • 11. TROJAN HORSE Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 12. LOGICAL BOMBS A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 13. OTHERS Time Bomb Script Virus Directory Virus
  • 14. Signature-Based Detection-Compare the contents of a file to a dictionary of virus.
  • 15. Behavior -Based Detection: Observe how the program execute in the computer Rather than looking for signature . Check the suspicious file and show warnings to the user.
  • 16. Heuristic -Based Detection:  Detect and remove all threats.  Create a generic signature.
  • 17. PREVENTION  Don't share Drive C: without a password and without read-only restrictions.  Use Anti-Virus.  Delete e-mail file attachments.  Have multiple backups of important files.  More secure operating systems e.g. UNIX
  • 18. ANY QUESTION
  • 19. THANK YOU

×