SlideShare a Scribd company logo
1 of 29
Computer
Viruses
MALWARES
   A software designed to
    infiltrate or damage a
    computer system
    without the owner's
    informed consent.
   A fusion of two words:
    MALICIOUS and
    SOFTWARE
Examples of MALWARES

               Computer viruses
               Worms
               Trojan horses
               Spyware
               Dishonest adware
WHAT IS A COMPUTER VIRUS?
Computer Virus is a
computer program,
designed as a prank or
a sabotage, that
replicates itself by
attaching to other
programs and carrying
out unwanted and
sometimes damaging
operations.
Some NOTES on VIRUSES…
 Viruses are computer programs
 A virus can only spread from one
  computer to another when its host is
  taken to the uninfected computer, for
  instance by a user sending it over a
  network or the Internet, or by
  carrying it on a removable medium
  such as a floppy disk, CD, or USB
  drive.
Some NOTES on VIRUSES…
Viruses are sometimes
 confused with computer
 worms and Trojan horses.
The terms virus is
 sometimes used to refer to
 other types of Malwares.
WHAT IS A WORM?
   a self-replicating
    computer program.
   it uses a network to
    send copies of itself to
    other nodes (computer
    terminals on the
    network) and it may do
    so without any user
    intervention.
   Unlike a virus, it does
    not need to attach itself
    to an existing program.
WHAT IS A TROJAN HORSE?
             any program that invites
              the user to run it, but
              conceals a harmful or
              malicious payload.
             The payload may take
              effect immediately and
              can lead to many
              undesirable effects
              they are often referred to
              as “time bomb” programs
WHAT IS A SPYWARE?
   a computer software that is
    installed secretly on a personal
    computer to intercept or take
    partial control over the user's
    interaction with the computer,
    without the user's informed
    consent.
   can collect various types of personal
    information; can also interfere with
    user control of the computer in
    other ways, such as installing
    additional software, accessing
    websites blindly that will cause
    more harmful viruses,
WHAT IS A ADWARE?
              advertising-supported
               software
              any software package
               which automatically
               plays, displays, or
               downloads advertising
               material to a computer
              Some types of adware
               are also spyware and
               can be classified as
               privacy-invasive
               software.
(Just some of the) HARM
COMPUTER
VIRUSES CAN DO …
              Overwrites boot sector
              Formats all/part of the
               disk
              Corrupts programs/data
               files
              Causes harm to the
               network
WHO WOULD CREATE A
      COMPUTER VIRUS
   THE WHIZ KID
   THE KSPs
   THE TERRORIST
   THE BUSINESSMAN
   THE RESEARCHER
SYMPTOMS of VIRUS INFECTION
   The computer runs slower than usual.
   The computer stops responding, or it
    locks up frequently.
   The computer crashes, and then it
    restarts every few minutes
   The computer restarts on its own.
    Additionally, the computer does not run
    as usual.
SYMPTOMS of VIRUS INFECTION

 Applications
             on the computer do
 not work correctly.
 Disksor disk drives are
 inaccessible.
 You   cannot print items correctly.
 You   see unusual error messages.
SYMPTOMS of VIRUS INFECTION
   You see distorted menus and dialog
    boxes.
   There is a double extension on an
    attachment that you recently opened,
    such as a .jpg, .vbs, .gif, or .exe. extension
   An antivirus program is disabled for no
    reason. Additionally, the antivirus
    program cannot be restarted
   An antivirus program cannot be installed
    on the computer, or the antivirus
    program will not run.
SYMPTOMS of VIRUS INFECTION
   New icons appear on the desktop that
    you did not put there, or the icons are
    not associated with any recently
    installed programs.
   Strange sounds or music plays from the
    speakers unexpectedly.
   A program disappears from the computer
    even though you did not intentionally
    remove the program.
   Some elusive viruses won’t show any
    symptoms at all
GUIDE for a VIRUS FREE
COMPUTING
          Know your computer
          Keep original copies of
           your executable programs
           in a safe place and backup
           data files regularly
          Control system access
GUIDE for a VIRUS FREE
        COMPUTING
   Scan all foreign
    diskettes/ removable
    storage you plan to use
   Use only software from
    reliable sources
   Maintain a library of
    anti-virus tools,
    utilities, diagnostics,
    etc.
GUIDES for a VIRUS FREE
    COMPUTING
 If possible, have the file
  attributes of your important
  programs set to read-only to
  prevent accidental overwriting
 If you suspect disk virus
  infection, consult a reliable
  adviser.
Current Trends

in
Information
Technology
MICROPROCESSORS for Power
Users
MICROPROCESSORS for Home
Users
MICROPROCESSORS for
Netbook Users
MICROPROCESSORS for
Netbook Users
HARD DRIVES
MOBILE COMPUTING
PRINTERS
SOFTWARE/PROGRAMS
INTERNET COMPUTING

More Related Content

What's hot

Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
Amrit Kaur
 

What's hot (20)

Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Antivirus
AntivirusAntivirus
Antivirus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 

Viewers also liked (18)

Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
 
Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer Use Eco Friendly Solar Agriculture Sprayer
Use Eco Friendly Solar Agriculture Sprayer
 
Apache
ApacheApache
Apache
 
Water conservation
Water conservationWater conservation
Water conservation
 
Water conservation
Water conservationWater conservation
Water conservation
 
Firewall
FirewallFirewall
Firewall
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Anti virus and current trends

Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
makanaya
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Cerise Anderson
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 

Similar to Anti virus and current trends (20)

COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
viruses
virusesviruses
viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
1311782 634629102605888750
1311782 6346291026058887501311782 634629102605888750
1311782 634629102605888750
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus project
Virus projectVirus project
Virus project
 
Virus
VirusVirus
Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

More from Athena Catindig

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentation
Athena Catindig
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation
Athena Catindig
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)
Athena Catindig
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)
Athena Catindig
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s love
Athena Catindig
 

More from Athena Catindig (7)

4.human development presentation
4.human development presentation4.human development presentation
4.human development presentation
 
1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation1.introduction and brief history of psychology presentation
1.introduction and brief history of psychology presentation
 
Biological basis of behavior (new)
Biological basis of behavior (new)Biological basis of behavior (new)
Biological basis of behavior (new)
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
 
Computer fundamentals 1
Computer fundamentals 1Computer fundamentals 1
Computer fundamentals 1
 
Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)Catechism for filipino catholics (cfc)
Catechism for filipino catholics (cfc)
 
Module 4 man s rejection of god s love
Module 4 man s rejection of god s loveModule 4 man s rejection of god s love
Module 4 man s rejection of god s love
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Anti virus and current trends

  • 2. MALWARES  A software designed to infiltrate or damage a computer system without the owner's informed consent.  A fusion of two words: MALICIOUS and SOFTWARE
  • 3. Examples of MALWARES  Computer viruses  Worms  Trojan horses  Spyware  Dishonest adware
  • 4. WHAT IS A COMPUTER VIRUS? Computer Virus is a computer program, designed as a prank or a sabotage, that replicates itself by attaching to other programs and carrying out unwanted and sometimes damaging operations.
  • 5. Some NOTES on VIRUSES…  Viruses are computer programs  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 6. Some NOTES on VIRUSES… Viruses are sometimes confused with computer worms and Trojan horses. The terms virus is sometimes used to refer to other types of Malwares.
  • 7. WHAT IS A WORM?  a self-replicating computer program.  it uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention.  Unlike a virus, it does not need to attach itself to an existing program.
  • 8. WHAT IS A TROJAN HORSE?  any program that invites the user to run it, but conceals a harmful or malicious payload.  The payload may take effect immediately and can lead to many undesirable effects  they are often referred to as “time bomb” programs
  • 9. WHAT IS A SPYWARE?  a computer software that is installed secretly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.  can collect various types of personal information; can also interfere with user control of the computer in other ways, such as installing additional software, accessing websites blindly that will cause more harmful viruses,
  • 10. WHAT IS A ADWARE?  advertising-supported software  any software package which automatically plays, displays, or downloads advertising material to a computer  Some types of adware are also spyware and can be classified as privacy-invasive software.
  • 11. (Just some of the) HARM COMPUTER VIRUSES CAN DO …  Overwrites boot sector  Formats all/part of the disk  Corrupts programs/data files  Causes harm to the network
  • 12. WHO WOULD CREATE A COMPUTER VIRUS  THE WHIZ KID  THE KSPs  THE TERRORIST  THE BUSINESSMAN  THE RESEARCHER
  • 13. SYMPTOMS of VIRUS INFECTION  The computer runs slower than usual.  The computer stops responding, or it locks up frequently.  The computer crashes, and then it restarts every few minutes  The computer restarts on its own. Additionally, the computer does not run as usual.
  • 14. SYMPTOMS of VIRUS INFECTION  Applications on the computer do not work correctly.  Disksor disk drives are inaccessible.  You cannot print items correctly.  You see unusual error messages.
  • 15. SYMPTOMS of VIRUS INFECTION  You see distorted menus and dialog boxes.  There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension  An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted  An antivirus program cannot be installed on the computer, or the antivirus program will not run.
  • 16. SYMPTOMS of VIRUS INFECTION  New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs.  Strange sounds or music plays from the speakers unexpectedly.  A program disappears from the computer even though you did not intentionally remove the program.  Some elusive viruses won’t show any symptoms at all
  • 17. GUIDE for a VIRUS FREE COMPUTING  Know your computer  Keep original copies of your executable programs in a safe place and backup data files regularly  Control system access
  • 18. GUIDE for a VIRUS FREE COMPUTING  Scan all foreign diskettes/ removable storage you plan to use  Use only software from reliable sources  Maintain a library of anti-virus tools, utilities, diagnostics, etc.
  • 19. GUIDES for a VIRUS FREE COMPUTING  If possible, have the file attributes of your important programs set to read-only to prevent accidental overwriting  If you suspect disk virus infection, consult a reliable adviser.