SlideShare a Scribd company logo
1 of 12
Presented by:
Kartik N. Kalpande..!
Agenda
 Introduction
 Types of Viruses
 Phases of Virus
 Difference between Virus & Worms
 Advantages
 Disadvantages
 Conclusion
Introduction
 Virus:-
A virus is a code or program that attaches itself to
another code or program which causes damage to the computer
system or to the network
It can replicate them. all computer viruses are manmade.
Any simple viruses can make a copy of itself over and over again.
Any simple viruses can be dangerous because it will
quickly use all available memory space and bring the system to a
halt.
Whereas, dangerous viruses are capable of transmitting
itself across networks and can be able to avoid security system.
Worms
 A worm is a special type of virus that can replicate itself
and use memory but can not attach itself to other
program
 Virus and worms will be the most common problem
that an organization faces
 Highly organized criminal groups want use the
technology used in worm propagation and virus, but
their use are normally interested in accomplishing is
limited.
Type of Viruses
 Parasitic viruses:-
It attaches itself to executable code and replicates itself. When the
infected code is executed it will find other executable code or program to
infect.
 Memory resident virus:-
This type of virus lives in memory after its execution. It inserts themselves
as a part of operating system or application and can manipulate any file
that is executed, copied or moved.
 Non-resident virus:-
This type of virus executes itself and terminated or destroyed after
specific time .
 Overwriting virus:-
This types of virus overwrite the code with its own code.
 Boot sector virus:-
This type of virus infects the boot record and spread through a
system when a system is booted from disk containing virus.
 Stealth virus:- it is the virus who hide the modification it has
made in the file or boot record.
 Macro virus:-
This viruses are not executable.It affects microsoft word like
documents they can spread through email.
 Companion virus:-
This is the virus which create a new program instead of modifying
an existing file
 Email viruses:-
Virus get executed when email attachment is open by
recipient. virus send itself to everyone on the mailing
list of sender.
 Polymorphic virus:-
It produces fully operational copies of itself,in an
attempts to avoid signature detection.
Phases of viruses(Life cycle of
Virus)
 Dormant phase:-
This virus is idle and eventually activated by some events.
 Propagation phase:-
The virus places and identical copy of itself into other
programs or into certain system areas on the disk
 Triggering phase:-
The virus is activated to perform the function for which it
was intended.
 Execution phase:-
In this phase the virus performs its actual operation.
Disadvantages
 It delete files in system.
 When a computer system is infected due to virus then it is
difficult to recover.
 Virus causes malfunctioning of a computer system
 It automatically attach to the executable file and replicate itself.
 It occupies disk space.
Difference between Virus and Worm
 Virus does not replicate itself whereas worm replicate
itself
 Virus is destructive in nature whereas worm is non
destructive
 Virus can infect other file whereas worm does not
infect other file but it occupies memory space by
replication
 Aim of virus is to infect the code or program stored on
computer system whereas the aim worm is to mac
computer and network unusable.
Conclusion
 It is harmful to our system so we should always use
antivirus software to protect our system
 We can use Linux operating system to avoid viruses and
worms because Linux does not support viruses
Thank You!!!

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 

What's hot (20)

Virus
VirusVirus
Virus
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Network security
Network security Network security
Network security
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
User authentication
User authenticationUser authentication
User authentication
 
Cyber security
Cyber securityCyber security
Cyber security
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 

Similar to Viruses ppt

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsSelim Reza Bappy
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 

Similar to Viruses ppt (20)

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ch19
Ch19Ch19
Ch19
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

More from Kartik Kalpande Patil

Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Kartik Kalpande Patil
 
Microcontroller in automobile and applications
Microcontroller in automobile and applicationsMicrocontroller in automobile and applications
Microcontroller in automobile and applicationsKartik Kalpande Patil
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printerKartik Kalpande Patil
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gatewayKartik Kalpande Patil
 

More from Kartik Kalpande Patil (20)

Data mining and knowledge Discovery
Data mining and knowledge DiscoveryData mining and knowledge Discovery
Data mining and knowledge Discovery
 
wireless charging in phones
wireless charging in phoneswireless charging in phones
wireless charging in phones
 
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
 
Versions of android
Versions of androidVersions of android
Versions of android
 
Ruby programming
Ruby programmingRuby programming
Ruby programming
 
Resent intel motherboards
Resent intel motherboardsResent intel motherboards
Resent intel motherboards
 
Resent intel microprocessor
Resent intel microprocessorResent intel microprocessor
Resent intel microprocessor
 
Parallel computing
Parallel computingParallel computing
Parallel computing
 
Open source movement
Open source movementOpen source movement
Open source movement
 
Object oriented dbms
Object oriented dbmsObject oriented dbms
Object oriented dbms
 
Network simulation software
Network simulation softwareNetwork simulation software
Network simulation software
 
Mirroring and replications
Mirroring and replicationsMirroring and replications
Mirroring and replications
 
Microprocessor in human body
Microprocessor in human bodyMicroprocessor in human body
Microprocessor in human body
 
Microcontroller in automobile and applications
Microcontroller in automobile and applicationsMicrocontroller in automobile and applications
Microcontroller in automobile and applications
 
Mahol. android ppt
Mahol. android pptMahol. android ppt
Mahol. android ppt
 
applet using java
applet using javaapplet using java
applet using java
 
Hadoop
HadoopHadoop
Hadoop
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printer
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
Data mining semiinar ppo
Data mining semiinar  ppoData mining semiinar  ppo
Data mining semiinar ppo
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Viruses ppt

  • 2. Agenda  Introduction  Types of Viruses  Phases of Virus  Difference between Virus & Worms  Advantages  Disadvantages  Conclusion
  • 3. Introduction  Virus:- A virus is a code or program that attaches itself to another code or program which causes damage to the computer system or to the network It can replicate them. all computer viruses are manmade. Any simple viruses can make a copy of itself over and over again. Any simple viruses can be dangerous because it will quickly use all available memory space and bring the system to a halt. Whereas, dangerous viruses are capable of transmitting itself across networks and can be able to avoid security system.
  • 4. Worms  A worm is a special type of virus that can replicate itself and use memory but can not attach itself to other program  Virus and worms will be the most common problem that an organization faces  Highly organized criminal groups want use the technology used in worm propagation and virus, but their use are normally interested in accomplishing is limited.
  • 5. Type of Viruses  Parasitic viruses:- It attaches itself to executable code and replicates itself. When the infected code is executed it will find other executable code or program to infect.  Memory resident virus:- This type of virus lives in memory after its execution. It inserts themselves as a part of operating system or application and can manipulate any file that is executed, copied or moved.  Non-resident virus:- This type of virus executes itself and terminated or destroyed after specific time .  Overwriting virus:- This types of virus overwrite the code with its own code.
  • 6.  Boot sector virus:- This type of virus infects the boot record and spread through a system when a system is booted from disk containing virus.  Stealth virus:- it is the virus who hide the modification it has made in the file or boot record.  Macro virus:- This viruses are not executable.It affects microsoft word like documents they can spread through email.  Companion virus:- This is the virus which create a new program instead of modifying an existing file
  • 7.  Email viruses:- Virus get executed when email attachment is open by recipient. virus send itself to everyone on the mailing list of sender.  Polymorphic virus:- It produces fully operational copies of itself,in an attempts to avoid signature detection.
  • 8. Phases of viruses(Life cycle of Virus)  Dormant phase:- This virus is idle and eventually activated by some events.  Propagation phase:- The virus places and identical copy of itself into other programs or into certain system areas on the disk  Triggering phase:- The virus is activated to perform the function for which it was intended.  Execution phase:- In this phase the virus performs its actual operation.
  • 9. Disadvantages  It delete files in system.  When a computer system is infected due to virus then it is difficult to recover.  Virus causes malfunctioning of a computer system  It automatically attach to the executable file and replicate itself.  It occupies disk space.
  • 10. Difference between Virus and Worm  Virus does not replicate itself whereas worm replicate itself  Virus is destructive in nature whereas worm is non destructive  Virus can infect other file whereas worm does not infect other file but it occupies memory space by replication  Aim of virus is to infect the code or program stored on computer system whereas the aim worm is to mac computer and network unusable.
  • 11. Conclusion  It is harmful to our system so we should always use antivirus software to protect our system  We can use Linux operating system to avoid viruses and worms because Linux does not support viruses