SlideShare a Scribd company logo
1 of 19
Computer Malware
By:
JATIN KUMAR & CHANCHAL JANGRAL
(NIT HAMIRPUR)
(9882926918-9882877417)
Introduction
• Malware, short for malicious software is any kind of unwanted
software that is installed without your consent on your computer.
• It is intended to take control, permanent damage, or corrupt
computer systems.
Viruses
• Computer viruses are small software programs that are designed
to spread from one computer to another and to interfere with
computer operation.
• They cause huge economic damage each year.
• A virus cannot be spread without a human action, (such as
running an infected program) to keep it going.
History of Viruses
• First computer virus Brain was created by two brothers Basit Farooq
and Amjad Farooq Alvi in 1986.
• They created it because they customers were selling illegal copies of
software's made by them.
• The purpose of this virus was to infect the booting system of
computer and hence preventing it from booting.
Types of Virus
• Boot Sector Virus
• Web Scripting Virus
• Resident Virus
• Polymorphic Virus
Why do People Create Computer
Viruses?
• To take control of a computer and use it
for specific tasks.
• To steal sensitive information (credit
card numbers, passwords, personal
details, data etc.)
• To prove ones skill or for revenge purposes.
Latest computer virus: Ransomware
• Files of users were encrypted and
payment was demanded in order to
recover them.
• Payment was demanded in virtual
currency.
How do viruses spread..??
• From removable media like hard
drive, pen drive, SD cards.
 From downloads of the Internet
 From e-mail attachments
How to detect virus?
• Program takes longer to load.
• The program size keeps changing.
• Your computer functions slower than normal.
• You see uncommon error messages.
Worms
• A computer worm is similar to a computer virus, but unlike a virus it does
not need to attach itself to an existing program.
• It can spread copies of itself from one computer to another without being
activated by users.
• Worm is designed to replicate itself and disperse throughout the user’s
network.
Trojan Horse
• Trojan horses are applications which appear to be
useful, legitimate applications but run malicious,
hidden code.
• The application may appear to perform tasks, such
as scanning for viruses, but actually steal personal
data from your system.
.
Trojan Horse Cont.
• Trojans are not worms since they do not replicate ,
but Trojan horse programs can be just as destructive.
• Executing Trojans may result in changing desktop
wallpaper, creating pop-ups, or even deleting files
Actions to prevent virus infection
• Use an antivirus program and keep it up to date.
• Don’t open e-mail that you are not sure.
• Keep your Operating System up to date.
Actions to prevent virus infection
• Never use infected drives.
• Never clicks of fake pop-ups.
How Antivirus works..??
• It compares the specific bits of your
application with the bits that are present
in it’s database.
• If it matches with the database then it
considers it as virus.
QUESTIONS…
Computer Malware and its types

More Related Content

What's hot (20)

Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malware
MalwareMalware
Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Anti virus
Anti virusAnti virus
Anti virus
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
spyware
spywarespyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
COMPUTER VIRUS
COMPUTER VIRUSCOMPUTER VIRUS
COMPUTER VIRUS
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 

Similar to Computer Malware and its types

Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threatAzri Abdin
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxsachingwalani24
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanwormJenMorri
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 

Similar to Computer Malware and its types (20)

Malicious
MaliciousMalicious
Malicious
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Malwares
MalwaresMalwares
Malwares
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Computer Malware and its types

  • 1. Computer Malware By: JATIN KUMAR & CHANCHAL JANGRAL (NIT HAMIRPUR) (9882926918-9882877417)
  • 2. Introduction • Malware, short for malicious software is any kind of unwanted software that is installed without your consent on your computer. • It is intended to take control, permanent damage, or corrupt computer systems.
  • 3.
  • 4. Viruses • Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. • They cause huge economic damage each year. • A virus cannot be spread without a human action, (such as running an infected program) to keep it going.
  • 5. History of Viruses • First computer virus Brain was created by two brothers Basit Farooq and Amjad Farooq Alvi in 1986. • They created it because they customers were selling illegal copies of software's made by them. • The purpose of this virus was to infect the booting system of computer and hence preventing it from booting.
  • 6. Types of Virus • Boot Sector Virus • Web Scripting Virus • Resident Virus • Polymorphic Virus
  • 7. Why do People Create Computer Viruses? • To take control of a computer and use it for specific tasks. • To steal sensitive information (credit card numbers, passwords, personal details, data etc.) • To prove ones skill or for revenge purposes.
  • 8. Latest computer virus: Ransomware • Files of users were encrypted and payment was demanded in order to recover them. • Payment was demanded in virtual currency.
  • 9. How do viruses spread..?? • From removable media like hard drive, pen drive, SD cards.
  • 10.  From downloads of the Internet  From e-mail attachments
  • 11. How to detect virus? • Program takes longer to load. • The program size keeps changing. • Your computer functions slower than normal. • You see uncommon error messages.
  • 12. Worms • A computer worm is similar to a computer virus, but unlike a virus it does not need to attach itself to an existing program. • It can spread copies of itself from one computer to another without being activated by users. • Worm is designed to replicate itself and disperse throughout the user’s network.
  • 13. Trojan Horse • Trojan horses are applications which appear to be useful, legitimate applications but run malicious, hidden code. • The application may appear to perform tasks, such as scanning for viruses, but actually steal personal data from your system. .
  • 14. Trojan Horse Cont. • Trojans are not worms since they do not replicate , but Trojan horse programs can be just as destructive. • Executing Trojans may result in changing desktop wallpaper, creating pop-ups, or even deleting files
  • 15. Actions to prevent virus infection • Use an antivirus program and keep it up to date. • Don’t open e-mail that you are not sure. • Keep your Operating System up to date.
  • 16. Actions to prevent virus infection • Never use infected drives. • Never clicks of fake pop-ups.
  • 17. How Antivirus works..?? • It compares the specific bits of your application with the bits that are present in it’s database. • If it matches with the database then it considers it as virus.