SlideShare a Scribd company logo
1 of 8
COMPUTER
VIRUS
BY P MUBASHIRA
B.SC B.ED MATHEMATICS
COMPUTER VIRUS
 A computer virus is a type of malicious
software, or malware, that spreads
between computers and causes damage to
data and software.
 Computer viruses aim to disrupt systems,
cause major operational issues, and result
in data loss and leakage.
TYPES OF
COMPUTER VIRUS
BOOT SECTOR VIRUS
DIRECT ACTION VIRUS
MULTIPARTITIE VIRUS
BOOT SECTOR VIRUS
 A boot sector virus is a
type of virus that infects
the boot sector of floppy
disks or the primary boot
record of hard disks.
 Some common boot
sector viruses
include Monkey, NYB
(also known as B1),
Stoned, and Form.
 Also boot sector is the
sector of a persistent data
storage device (e.g., hard
disk, floppy disk, optical
disc, etc.)
DIRECT ACTION VIRUS
 When a virus attaches itself
directly to a .exe or .com file
and enters the device while its
execution is called a Direct
Action Virus.
 If it gets installed in the
memory, it keeps itself
hidden.
 It is also known as Non-
Resident Virus
 Examples of direct action
viruses : Vienna virus : the
Vienna virus has the
distinction of being the first
virus to be destroyed by an
antivirus. .
Multipartite Virus
 A multipartite virus is a type of
fast-acting malware that attacks a
device's boot sector and
executable files simultaneously.
 Multipartite viruses are often
considered more problematic
than traditional computer viruses
due to their ability to spread in
multiple ways.
 The first reported instance of a
multipartite virus was in
1989. Ghostball was the name of
this particular virus and it
targeted the executable files and
boot sectors of the computers it
infected. However, Ghostball
wasn't able to reach many victims
as the internet was fairly new at
the time it started spreading.
DISADVANTAGES OF
COMPUTER VIRUS
 It may lead to crashing of computer system
 It may cause the system to run very slow as a
result of the deletion of vital files required by the
system.
 Viruses are designed to target valuable and
sensitive information of the victims
 It may reduce the performance of the computer
hardware
 It may temper with the initial settings of the
operation system
 Virus may alter the primary objective of
applications installed in the computer system
THANK
YOU

More Related Content

Similar to COMPUTER VIRUS.pptx

Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
Joy Chakraborty
 

Similar to COMPUTER VIRUS.pptx (20)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Virus
VirusVirus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

COMPUTER VIRUS.pptx

  • 2. COMPUTER VIRUS  A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software.  Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
  • 3. TYPES OF COMPUTER VIRUS BOOT SECTOR VIRUS DIRECT ACTION VIRUS MULTIPARTITIE VIRUS
  • 4. BOOT SECTOR VIRUS  A boot sector virus is a type of virus that infects the boot sector of floppy disks or the primary boot record of hard disks.  Some common boot sector viruses include Monkey, NYB (also known as B1), Stoned, and Form.  Also boot sector is the sector of a persistent data storage device (e.g., hard disk, floppy disk, optical disc, etc.)
  • 5. DIRECT ACTION VIRUS  When a virus attaches itself directly to a .exe or .com file and enters the device while its execution is called a Direct Action Virus.  If it gets installed in the memory, it keeps itself hidden.  It is also known as Non- Resident Virus  Examples of direct action viruses : Vienna virus : the Vienna virus has the distinction of being the first virus to be destroyed by an antivirus. .
  • 6. Multipartite Virus  A multipartite virus is a type of fast-acting malware that attacks a device's boot sector and executable files simultaneously.  Multipartite viruses are often considered more problematic than traditional computer viruses due to their ability to spread in multiple ways.  The first reported instance of a multipartite virus was in 1989. Ghostball was the name of this particular virus and it targeted the executable files and boot sectors of the computers it infected. However, Ghostball wasn't able to reach many victims as the internet was fairly new at the time it started spreading.
  • 7. DISADVANTAGES OF COMPUTER VIRUS  It may lead to crashing of computer system  It may cause the system to run very slow as a result of the deletion of vital files required by the system.  Viruses are designed to target valuable and sensitive information of the victims  It may reduce the performance of the computer hardware  It may temper with the initial settings of the operation system  Virus may alter the primary objective of applications installed in the computer system