SlideShare a Scribd company logo
1 of 23
COMPUTER
VIRUS
GROUP MEMBERS (group # 9)
■ Alishba Ijaz Roll # 1721110003
■ Aqsa Shahid Roll # 1721110006
■ Zartash Jamil Roll # 1721110082
■ Noor Khalil Roll # 1721110051
Contents:
■ INTRODUCTION
■ History of Computer Virus
■ Similarities b/w biological and computer virus
■ How Does A Virus Work?
■ Life Cycle Of Computer Virus
■ Functional Diagram of VIRUS
■ Types of VIRUS
■ Methods of detecting Virus By ANTI-VIRUS
■ Prevention
Virus
V I R U S
VITAL
INFORMATION
RESOURC
E
UNDER
SIEGE(SLANG)
A VIRUS is ILLEGAL Computer Code that can do
such things as alter programs or destroy data. Also,
the virus can copy itself onto programs, thereby
spreading its damaging effects.
HISTORY OF
COMPUTER
VIRUS
John Von Neumann:
Fred Cohen:
CORE WARS:
He came up with the theory about self-Replicating programs.
He came up with the term COMPUTER VIRUS.
 An Application not release until 1984.
 It Replicates itself every single time it was Run in Computer.
Reapers:
MS-DOS:
Morris Worms:
Antivirus application specifically designed to destroy core wars of an
infected Computers.
 Most popular OS when viruses becoming thick and fast.
 The most targeted OS by “THE BRAIN” Virus which release in
Pakistan in 1986.
Created by ROBERT MORRIS,23,a small virus that infected almost
6,000 computers.
Melissa Virus:
I Love You Virus:
Code Red Virus:
It managed to infect thousands of computers at an alarming
speed, causing over $80 million in damages.
 It managed to infect millions of computers in just a day.
 The virus sent usernames and passwords it found on the
infected computer back to the author.
It infected over 700,000 of computers, causing damages in excess of
$2 billion.
IN 2004:
No more notable
viruses appeared
due to
sophisticated
antivirus and
firewall system.
Similarities b/w biological & computer
virus:
Computer virus are called viruses because they share some of the traits of biological
Viruses. A computer virus passed from computer to computer like a biological virus
Passes from person to person.
 Need a host for residence.
 Capable of self-replicate.
 Cause damage to host.
How Does A VIRUS Spread?
• First, the virus is linked to the host object in such a way that it
activates when the host object is used.
• Second, virus looks for other suitable carrier objects and attaches
itself to them.
• With this dependency virus slows down the system.
A typical lifecycle of a computer Virus:
The virus waits until user transmits the
infected object to another computer.
User transmits an infected object to another
computer.
The virus locates and infects suitable objects
on the new computer.
Types of Virus:
MACRO
VIRUS.
BOOT SECTOR
VIRUS.
WORMS.
TROJEN
HORSES.
LOGIC
BOMBS.
MACRO VIRUS:
BOOT SECTOR VIRUS:
A macro virus is associated with application
Software like WORD and EXCEL. When opening
the infected document, macro virus is loaded into
main memory and destroys the data stored in
hard disk.
A boot sector virus infects boot sector of the
computers. During system boot, boot sector virus
is load into main memory and destroys data
stored in hard disk.
WORMS:
Types of Worms Virus:
A worm is also a destructive program that fills a computer system
with Self-Replicating information.
MAIL WORMS
PURE WORMS
TROJAN HORSE:
LOGICAL BOMBS:
Trojan Horse is a destructive program. It
usually pretends as computer games or
application software. If executed, computer
system will be damaged.
A logical bomb is a destructive
program that performs an activity
when a certain action has
occurred.
OTHERS:
• Time Bomb.
• Script Virus.
• Directory Virus.
Methods Of Detecting The Virus By Anti-
Virus:
• Signature Based Detection :
Compare the contents of a file to a dictionary of virus.
DATA BASE
-- - - - - - - - - - -
- - - - - -- - - - - -
- - - - - - - -- - - -
-- - -- - - - - - - - -
- - - -
101010
- - - - - - - - - - -
-
111001
- - - - - - -
101010
101110
- - - - - - -
101101
- - - - - - -
SAFE VIRUS
SAFE SAFE
Behavior based Detection:
• Observe how the program execute in the
computer
Rather than looking for signature.
• Check the suspicious file and show
warnings to the User.
PREVENTION:
Do not share Drive C: without a
password and without read-only
restrictions.
Use Anti-Virus.
Delete e-mail file attachments.
Have multiple backups of
important files.
More secure operating systems
e.g. UNIX
ANY QUESTION?
Computer viruses

More Related Content

What's hot

Computer viruses
Computer virusesComputer viruses
Computer viruses
Billiyan
 
Virus09
Virus09Virus09
Virus09
defler
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 

What's hot (20)

Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Viruspresentacion10
Viruspresentacion10Viruspresentacion10
Viruspresentacion10
 
Virus
VirusVirus
Virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus09
Virus09Virus09
Virus09
 
Virus
Virus  Virus
Virus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Cruda, mayday pp tx 2
 Cruda, mayday pp tx 2 Cruda, mayday pp tx 2
Cruda, mayday pp tx 2
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Similar to Computer viruses

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 

Similar to Computer viruses (20)

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Computer viruses

  • 1.
  • 3. GROUP MEMBERS (group # 9) ■ Alishba Ijaz Roll # 1721110003 ■ Aqsa Shahid Roll # 1721110006 ■ Zartash Jamil Roll # 1721110082 ■ Noor Khalil Roll # 1721110051
  • 4. Contents: ■ INTRODUCTION ■ History of Computer Virus ■ Similarities b/w biological and computer virus ■ How Does A Virus Work? ■ Life Cycle Of Computer Virus ■ Functional Diagram of VIRUS ■ Types of VIRUS ■ Methods of detecting Virus By ANTI-VIRUS ■ Prevention
  • 5. Virus V I R U S VITAL INFORMATION RESOURC E UNDER SIEGE(SLANG) A VIRUS is ILLEGAL Computer Code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
  • 7. John Von Neumann: Fred Cohen: CORE WARS: He came up with the theory about self-Replicating programs. He came up with the term COMPUTER VIRUS.  An Application not release until 1984.  It Replicates itself every single time it was Run in Computer.
  • 8. Reapers: MS-DOS: Morris Worms: Antivirus application specifically designed to destroy core wars of an infected Computers.  Most popular OS when viruses becoming thick and fast.  The most targeted OS by “THE BRAIN” Virus which release in Pakistan in 1986. Created by ROBERT MORRIS,23,a small virus that infected almost 6,000 computers.
  • 9. Melissa Virus: I Love You Virus: Code Red Virus: It managed to infect thousands of computers at an alarming speed, causing over $80 million in damages.  It managed to infect millions of computers in just a day.  The virus sent usernames and passwords it found on the infected computer back to the author. It infected over 700,000 of computers, causing damages in excess of $2 billion.
  • 10. IN 2004: No more notable viruses appeared due to sophisticated antivirus and firewall system.
  • 11. Similarities b/w biological & computer virus: Computer virus are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person.  Need a host for residence.  Capable of self-replicate.  Cause damage to host.
  • 12. How Does A VIRUS Spread? • First, the virus is linked to the host object in such a way that it activates when the host object is used. • Second, virus looks for other suitable carrier objects and attaches itself to them. • With this dependency virus slows down the system.
  • 13. A typical lifecycle of a computer Virus: The virus waits until user transmits the infected object to another computer. User transmits an infected object to another computer. The virus locates and infects suitable objects on the new computer.
  • 14. Types of Virus: MACRO VIRUS. BOOT SECTOR VIRUS. WORMS. TROJEN HORSES. LOGIC BOMBS.
  • 15. MACRO VIRUS: BOOT SECTOR VIRUS: A macro virus is associated with application Software like WORD and EXCEL. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk. A boot sector virus infects boot sector of the computers. During system boot, boot sector virus is load into main memory and destroys data stored in hard disk.
  • 16. WORMS: Types of Worms Virus: A worm is also a destructive program that fills a computer system with Self-Replicating information. MAIL WORMS PURE WORMS
  • 17. TROJAN HORSE: LOGICAL BOMBS: Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 18. OTHERS: • Time Bomb. • Script Virus. • Directory Virus.
  • 19. Methods Of Detecting The Virus By Anti- Virus: • Signature Based Detection : Compare the contents of a file to a dictionary of virus. DATA BASE -- - - - - - - - - - - - - - - - -- - - - - - - - - - - - - -- - - - -- - -- - - - - - - - - - - - - 101010 - - - - - - - - - - - - 111001 - - - - - - - 101010 101110 - - - - - - - 101101 - - - - - - - SAFE VIRUS SAFE SAFE
  • 20. Behavior based Detection: • Observe how the program execute in the computer Rather than looking for signature. • Check the suspicious file and show warnings to the User.
  • 21. PREVENTION: Do not share Drive C: without a password and without read-only restrictions. Use Anti-Virus. Delete e-mail file attachments. Have multiple backups of important files. More secure operating systems e.g. UNIX