SlideShare a Scribd company logo
1 of 16
Topic:- Difference between Virus and Worms
SHRI VAISHNAV INSTITUTE OF
FORENSIC SCIENCE
Submitted to:
Mr. Dinesh Kamble Sir
SVIFS, Indore
Submitted By:
Arti Raghuvanshi
MSc Forensic Science
SVIFS, Indore
INTRODUCTION
VIRUSES :-
 A computer virus is a computer program that can copy itself
and infect a computer without permission or knowledge of the
user.
 Virus program must be executed in order to infect a computer
system.
 A virus cannot spread without human action to keep it going.
 EXAMPLES : Melissa,zeus,code red etc..
1
HOW VIRUS WORKS
User call for a legitimate program
The virus code, having inserted itself in the
order of execution, executes instead or in
addition to the legitimate program
The virus code terminates and returns
control to the legitimate program
2
3
TYPES OF VIRUSES
MULTIPARTI
TE VIRUS
BOOT
VIRUSES
MACRO
VIRUSES
FILE
INFECTORS
WORMS :
 Worm is a standalone malware computer program that
replicate itself in order to spread to other computers.
 It has capability to travel without human action.
 IT is an independent program that does not modify other
programs, but reproduces itself over and over again until it
slows down or shut down computer or network.
 EXAMPLE : The Morris worm, the storm worm etc..
4
WORMS CAN SPREAD THROUGH
Files found in email attachments.
Through a web link or FTP resource.
Links received through the ICQ and IRC
(Internet Relay Chat) message.
Via peer-to-peer file sharing networks
5
6
TTYPES OF WORMS
EMAIL
WORM
FILE SHARING
NETWORK
WORM
DSINSTANT
MESSAGING
WORM
INTERNET
WORM
DIFFERENCES COMPUTER VIRUSES COMPUTER WORMS
DEFINATION Virus is a program code
that attach itself to
application and when
application program run it
runs along with it
Worm code replicate itself
in order to consume
resources to bring it down
HOW DOES IT INFECT
COMPUTER
It insert itself into a file or
executable program
It exploits weakness in an
application or operating
system by replicating itself
HOW CAN IT SPREAD It has to rely on users
transferring infected
files/programs to other
computer system
It need not to rely on users
transferring infected
files/programs to other
computer system
DOES IT INFECT FILES Yes , it deletes or modify
files.
Usually not
WHOSE SPEED IS MORE Viruses slower than worms Worms are faster than
7
Top 5 sources of computer viruses and worms
attack
 DOWNLOADABLE PROGAMS
 CRACKED SOFTWARE
 E-MAIL ATTACHMENTS
 INTERNET
 BOOTING OF CD.
8
TROZAN HORSE
 A malicious computer program that can copy itself and infect a computer
without permission of knowledge of the user.
 They cannot replicate automatically.
 MAIN TYPES OF TROZAN HORSES
• Remote access trojans
• Data sending trojans
• Destructive trojans
• Proxy trojans
• File transfer protocol trojans
• Security software disable trojans
• Denial of services attack trojans
9
TRAPDOOR
 A computer trapdoor, also called back door, provides a secret or
undocumented method of gaining access to an application,
operating system or online service.
 Can be used legitimately by programmers to debug and test
programs.
 Trap doors become threat when they are used by unscrupulous
programmers to gain unauthorized access.
 EXAMPLES :
• A video game – like simulation mode and direct interaction with the
artificial intelligence
• Apps/games request in facebook ask us to allow the apps to access
your information
• Emilia attack
10
LOGIC BOMB
 One of the oldest types of malicious software
 Piece of code that executes itself when pre-defined conditions
are met
 Logic bombs that execute on certain days known as time
bombs
 Gets activated when certain conditions are met
- presence/absence of some files
- particular date/time
- particular user
 When triggered typically damages system
- modify/delete files/disks/halt machines etc
11
SUPER ZAPPING
 It is a technique made possible by a special program available
on most compute systems – a program that bypasses all
system controls when computer crashes and cannot be
restarted with normal recovery procedure.
 This program, infect, is a “master key” that can provide access
to any other part of the system.
 The super zap program is a highly privileged “disaster aid "that
very few computer system professionals are authorized to
use.
12
PROTECTING YOUR COMPUTER
 To ensure that operating system is up-to-date.
 To have antivirus software and make sure it has capability to
scan e-mail and files .
 Run a full disk scan periodically
 Try avoid downloading and installing software from untrusted
sources.
 Install only registered copies of software in the system.
 Use a firewall.
13
CONCLUSION
 If virus and worms attack on computer it disturb our
system,corrupts data,some times deletes and harm computer.
 Smart surfing is highly recommended.
 Avoiding third party downloads.
 Having a hardware-based firewall .
 Regularly backup for data.
 For better and safe computation Anti-virus software should be
installed
14
THANK YOU
15

More Related Content

What's hot (20)

Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Similar to Difference between Virus and Worms Explained

Similar to Difference between Virus and Worms Explained (20)

Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Presentation2
Presentation2Presentation2
Presentation2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Ch19
Ch19Ch19
Ch19
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Computer virus
Computer virus Computer virus
Computer virus
 
Mitppt
MitpptMitppt
Mitppt
 
Ch19
Ch19Ch19
Ch19
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus project
Virus projectVirus project
Virus project
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Malicious
MaliciousMalicious
Malicious
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 

More from DINESH KAMBLE

More from DINESH KAMBLE (9)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Memory
MemoryMemory
Memory
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Difference between Virus and Worms Explained

  • 1. Topic:- Difference between Virus and Worms SHRI VAISHNAV INSTITUTE OF FORENSIC SCIENCE Submitted to: Mr. Dinesh Kamble Sir SVIFS, Indore Submitted By: Arti Raghuvanshi MSc Forensic Science SVIFS, Indore
  • 2. INTRODUCTION VIRUSES :-  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  Virus program must be executed in order to infect a computer system.  A virus cannot spread without human action to keep it going.  EXAMPLES : Melissa,zeus,code red etc.. 1
  • 3. HOW VIRUS WORKS User call for a legitimate program The virus code, having inserted itself in the order of execution, executes instead or in addition to the legitimate program The virus code terminates and returns control to the legitimate program 2
  • 4. 3 TYPES OF VIRUSES MULTIPARTI TE VIRUS BOOT VIRUSES MACRO VIRUSES FILE INFECTORS
  • 5. WORMS :  Worm is a standalone malware computer program that replicate itself in order to spread to other computers.  It has capability to travel without human action.  IT is an independent program that does not modify other programs, but reproduces itself over and over again until it slows down or shut down computer or network.  EXAMPLE : The Morris worm, the storm worm etc.. 4
  • 6. WORMS CAN SPREAD THROUGH Files found in email attachments. Through a web link or FTP resource. Links received through the ICQ and IRC (Internet Relay Chat) message. Via peer-to-peer file sharing networks 5
  • 7. 6 TTYPES OF WORMS EMAIL WORM FILE SHARING NETWORK WORM DSINSTANT MESSAGING WORM INTERNET WORM
  • 8. DIFFERENCES COMPUTER VIRUSES COMPUTER WORMS DEFINATION Virus is a program code that attach itself to application and when application program run it runs along with it Worm code replicate itself in order to consume resources to bring it down HOW DOES IT INFECT COMPUTER It insert itself into a file or executable program It exploits weakness in an application or operating system by replicating itself HOW CAN IT SPREAD It has to rely on users transferring infected files/programs to other computer system It need not to rely on users transferring infected files/programs to other computer system DOES IT INFECT FILES Yes , it deletes or modify files. Usually not WHOSE SPEED IS MORE Viruses slower than worms Worms are faster than 7
  • 9. Top 5 sources of computer viruses and worms attack  DOWNLOADABLE PROGAMS  CRACKED SOFTWARE  E-MAIL ATTACHMENTS  INTERNET  BOOTING OF CD. 8
  • 10. TROZAN HORSE  A malicious computer program that can copy itself and infect a computer without permission of knowledge of the user.  They cannot replicate automatically.  MAIN TYPES OF TROZAN HORSES • Remote access trojans • Data sending trojans • Destructive trojans • Proxy trojans • File transfer protocol trojans • Security software disable trojans • Denial of services attack trojans 9
  • 11. TRAPDOOR  A computer trapdoor, also called back door, provides a secret or undocumented method of gaining access to an application, operating system or online service.  Can be used legitimately by programmers to debug and test programs.  Trap doors become threat when they are used by unscrupulous programmers to gain unauthorized access.  EXAMPLES : • A video game – like simulation mode and direct interaction with the artificial intelligence • Apps/games request in facebook ask us to allow the apps to access your information • Emilia attack 10
  • 12. LOGIC BOMB  One of the oldest types of malicious software  Piece of code that executes itself when pre-defined conditions are met  Logic bombs that execute on certain days known as time bombs  Gets activated when certain conditions are met - presence/absence of some files - particular date/time - particular user  When triggered typically damages system - modify/delete files/disks/halt machines etc 11
  • 13. SUPER ZAPPING  It is a technique made possible by a special program available on most compute systems – a program that bypasses all system controls when computer crashes and cannot be restarted with normal recovery procedure.  This program, infect, is a “master key” that can provide access to any other part of the system.  The super zap program is a highly privileged “disaster aid "that very few computer system professionals are authorized to use. 12
  • 14. PROTECTING YOUR COMPUTER  To ensure that operating system is up-to-date.  To have antivirus software and make sure it has capability to scan e-mail and files .  Run a full disk scan periodically  Try avoid downloading and installing software from untrusted sources.  Install only registered copies of software in the system.  Use a firewall. 13
  • 15. CONCLUSION  If virus and worms attack on computer it disturb our system,corrupts data,some times deletes and harm computer.  Smart surfing is highly recommended.  Avoiding third party downloads.  Having a hardware-based firewall .  Regularly backup for data.  For better and safe computation Anti-virus software should be installed 14