SlideShare a Scribd company logo
1 of 13
COMPUTER VIRUS
A computer virus is a software programmed with an ability to make
copies of itself, which attacks itself to other applications or files.
 All computer viruses are man-made.
 Simply virus is more dangerous because it will quickly affected in computer
programs.
 For example : you could receive email with a malicious attachment, open the file
unknowingly and then the computer virus runs on your computer
TYPE OF COMPUTER VIRUS
VIRUS
BASIC
VIRUS
EMAIL
VIRUS
TROJAN WORMS
MALWARE
 The word malware come from the combination of malicious and software
 Malware = malicious + software
 It is a malicious software that gets installed in your device and performs
unwanted tasks, often for some third parties benefits.
 Sophos can be installed on Windows, Linux and MAC computers for protecting
all computers from unwanted attacks.
TYPES OF MALWARES
 VIRUS
 SPYWARE
 ADWARE
 BROWSER HIJACKING SOFTWARE
 VIRUS
Software that replicate itself and spreads by damaging and deleting the file.
Virus enters your device via attached images, greetings, audio –video files,
downloads etc.
 SPYWARE
It is a programme that gets installed without the users permission.
 ADWARE
Software that is financially supported by displaying ads when you are connected
to the internet.
It is used by the company for marketing purposes.
 BROWSER HIJACKING SOFTWARE
Software that modifies your browser settings, create desktop shortcuts and
display intermittent advertising pop ups. Once a browser is hijacked the software
may also redirect links to other sites that advertise or sites that advertise or sites
that collect web usage information's.
SPYWARE
Spyware is one type of malicious software (Malware) that collect information's
from a computing system without content.
Spyware can capture keystrokes, Screenshots, data from web, Internet usage
,habits and other personal information's.
ANTI SPYWARE PROTECTION
 Use Norton Internet Security to provide anti – spyware protection and
proactively protect from other security risks.
 Configure the firewall in Norton Internet Security to block unsolicited
requests for outbound communication.
 Do not accept or open suspicious error dialogs from within the browser.
 Spyware may come as part of a “ free deal” offer – do not accept free deals.
TROJAN
 It is a type of malware.
 It can be employed by cyber thieves and hackers trying to gain access to
user’s systems.
 Trojan can enable to spy of your private matter.
 These actions can include
1. Deleting data
2. Blocking data
3. Modifying data
4. Copying data
athira m s.pptx
athira m s.pptx
athira m s.pptx
athira m s.pptx

More Related Content

Similar to athira m s.pptx

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 

Similar to athira m s.pptx (20)

Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Ppt123
Ppt123Ppt123
Ppt123
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
IT viruses
 IT viruses IT viruses
IT viruses
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computervirus
Computervirus Computervirus
Computervirus
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 

athira m s.pptx

  • 1.
  • 2. COMPUTER VIRUS A computer virus is a software programmed with an ability to make copies of itself, which attacks itself to other applications or files.  All computer viruses are man-made.  Simply virus is more dangerous because it will quickly affected in computer programs.  For example : you could receive email with a malicious attachment, open the file unknowingly and then the computer virus runs on your computer
  • 3. TYPE OF COMPUTER VIRUS VIRUS BASIC VIRUS EMAIL VIRUS TROJAN WORMS
  • 4. MALWARE  The word malware come from the combination of malicious and software  Malware = malicious + software  It is a malicious software that gets installed in your device and performs unwanted tasks, often for some third parties benefits.  Sophos can be installed on Windows, Linux and MAC computers for protecting all computers from unwanted attacks.
  • 5. TYPES OF MALWARES  VIRUS  SPYWARE  ADWARE  BROWSER HIJACKING SOFTWARE
  • 6.  VIRUS Software that replicate itself and spreads by damaging and deleting the file. Virus enters your device via attached images, greetings, audio –video files, downloads etc.  SPYWARE It is a programme that gets installed without the users permission.  ADWARE Software that is financially supported by displaying ads when you are connected to the internet. It is used by the company for marketing purposes.  BROWSER HIJACKING SOFTWARE Software that modifies your browser settings, create desktop shortcuts and display intermittent advertising pop ups. Once a browser is hijacked the software may also redirect links to other sites that advertise or sites that advertise or sites that collect web usage information's.
  • 7. SPYWARE Spyware is one type of malicious software (Malware) that collect information's from a computing system without content. Spyware can capture keystrokes, Screenshots, data from web, Internet usage ,habits and other personal information's.
  • 8. ANTI SPYWARE PROTECTION  Use Norton Internet Security to provide anti – spyware protection and proactively protect from other security risks.  Configure the firewall in Norton Internet Security to block unsolicited requests for outbound communication.  Do not accept or open suspicious error dialogs from within the browser.  Spyware may come as part of a “ free deal” offer – do not accept free deals.
  • 9. TROJAN  It is a type of malware.  It can be employed by cyber thieves and hackers trying to gain access to user’s systems.  Trojan can enable to spy of your private matter.  These actions can include 1. Deleting data 2. Blocking data 3. Modifying data 4. Copying data