SlideShare a Scribd company logo
1 of 25
Download to read offline
Introduction to Computer
Virus and Malware
Bhupinder Singh
Presentation Content
• Description
• Virus Characteristics
• Different Types of Malwares
• Different Types of Viruses
• Safe Computing Tips and Techniques
Introduction
Description
A program (a block of executable code) that has the ability to
replicate, or make copies of itself, and spread to other files.
What is a Computer Virus?
Description
What is a Malware?
Unexpected or malicious program or mobile codes
What does a Malware do to a
Computer
Some Possible Malware Payloads:
• Simple display of messages
• Delete or corrupt files,hard disk
• Interfere with computer operations
• Spread to other files and computers
• Compromise computer or network security
How do Viruses and Other Malware spread?
From Disk to Disk
From Program to Program
From Document to Document
Via E-mail and Internet
Over the Network
They spread…
They spread…
Virus Characteristics
Direct-Action
Direct-Action
Virus Characteristics
Memory-Resident
Memory-Resident
Direct-Action vs. Memory-Resident
Infect files during execution of virus
• Installs itself in memory
• Monitors the activity of the computer
• Infects files on certain conditions
(i.e. when they are executed, opened, etc.)
Stealth
Stealth
Implements a way to hide modifications
Polymorphic
Polymorphic
Produces varied but functional copies of
itself.
Virus Characteristics
Different Forms of Malware
Different Types of Malwares
• Trojans
• Worms
• Joke Programs
• Droppers
• Viruses
• Backdoors
• DDos Programs
Trojan Programs
Trojan Horse Programs
Trojans are programs that may appear harmless,
but perform unexpected or unauthorized, usually
malicious, actions
• downloading and uploading files on their computer
• reading all of their IRC logs and learning interesting things
about them and their friends.
• reading their ICQ messages.
• stealing information such as credit card numbers,
username and passwords, etc..
• and worst…deleting their files, formatting their hard drive.
The Dangers of a Trojan
Computer Worms
Worms
A computer worm is a program (or set of programs) that is able to spread
copies of itself to other computer systems.Unlike viruses, worms do not need to
attach themselves to host programs.
Checking for Trojans and Worms
Some Symptoms:
• Unusual system slowdown and/or behavior
• Unusual tasks running
• Modifications on the Registry
• Modifications in configuration files.
• Unusual emails sent
(without the user’s consent)
Joke Programs
Joke Programs
• Ordinary executable programs.
• Created to make fun of users.
• These programs do not intend to
destroy data
Some Characteristics:
• Similar to ordinary executable programs
• Will not infect other programs
• Will not do any damage directly
• May annoy or tease the user
• May be difficult to halt or terminate
• May cause some devices (e.g., mouse or
keyboard) to temporarily function abnormally
Joke Programs
Malware Droppers
Malware Droppers
Upon execution, this malware will
drop a virus or other malware.
When the dropped malware is
executed, it can infect files or
cause damage
A program that drops a virus or other malware
Backdoors
Backdoors
Backdoors
A backdoor is a program that opens secret access to
systems, and is often used to bypass system security.
Backdoors
Here are some of the things that these
Here are some of the things that these
backdoors are capable of:
backdoors are capable of:
 Log keystrokes
 Edit or delete files and folders
 Edit the registry
 Send out confidential information such as password to
the hacker
 Run programs on the host or target machine
 Restart or shut down the computer
 Capture screens
 Browse and send out files to the hacker
 Change computer settings such as wallpaper
 Kill or disable running programs

More Related Content

Similar to virus-part2-150726093824-lva1-app6891.pdf

Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
hiiraa
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
wargames12
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 

Similar to virus-part2-150726093824-lva1-app6891.pdf (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Malwares
MalwaresMalwares
Malwares
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS.pptx
COMPUTER VIRUS.pptxCOMPUTER VIRUS.pptx
COMPUTER VIRUS.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virusppt
ViruspptVirusppt
Virusppt
 
Worm
WormWorm
Worm
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 

More from NORTHCUSTOMS (7)

informatique1as_project-virus.pptx
informatique1as_project-virus.pptxinformatique1as_project-virus.pptx
informatique1as_project-virus.pptx
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa (1).ppt
 
901130_computer1.ppt
901130_computer1.ppt901130_computer1.ppt
901130_computer1.ppt
 
Viruses.ppt
Viruses.pptViruses.ppt
Viruses.ppt
 
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.pptd8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
d8a7d984d981d98ad8b1d988d8b3d8a7d8aa.ppt
 
تحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptxتحرير الكتب الرسمية وكتابة المختصر .pptx
تحرير الكتب الرسمية وكتابة المختصر .pptx
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

virus-part2-150726093824-lva1-app6891.pdf

  • 1. Introduction to Computer Virus and Malware Bhupinder Singh
  • 2. Presentation Content • Description • Virus Characteristics • Different Types of Malwares • Different Types of Viruses • Safe Computing Tips and Techniques Introduction
  • 3. Description A program (a block of executable code) that has the ability to replicate, or make copies of itself, and spread to other files. What is a Computer Virus?
  • 4. Description What is a Malware? Unexpected or malicious program or mobile codes
  • 5. What does a Malware do to a Computer Some Possible Malware Payloads: • Simple display of messages • Delete or corrupt files,hard disk • Interfere with computer operations • Spread to other files and computers • Compromise computer or network security
  • 6. How do Viruses and Other Malware spread? From Disk to Disk From Program to Program From Document to Document Via E-mail and Internet Over the Network They spread… They spread…
  • 8. Direct-Action Direct-Action Virus Characteristics Memory-Resident Memory-Resident Direct-Action vs. Memory-Resident Infect files during execution of virus • Installs itself in memory • Monitors the activity of the computer • Infects files on certain conditions (i.e. when they are executed, opened, etc.)
  • 9. Stealth Stealth Implements a way to hide modifications Polymorphic Polymorphic Produces varied but functional copies of itself. Virus Characteristics
  • 11. Different Types of Malwares • Trojans • Worms • Joke Programs • Droppers • Viruses • Backdoors • DDos Programs
  • 13. Trojan Horse Programs Trojans are programs that may appear harmless, but perform unexpected or unauthorized, usually malicious, actions
  • 14. • downloading and uploading files on their computer • reading all of their IRC logs and learning interesting things about them and their friends. • reading their ICQ messages. • stealing information such as credit card numbers, username and passwords, etc.. • and worst…deleting their files, formatting their hard drive. The Dangers of a Trojan
  • 16. Worms A computer worm is a program (or set of programs) that is able to spread copies of itself to other computer systems.Unlike viruses, worms do not need to attach themselves to host programs.
  • 17. Checking for Trojans and Worms Some Symptoms: • Unusual system slowdown and/or behavior • Unusual tasks running • Modifications on the Registry • Modifications in configuration files. • Unusual emails sent (without the user’s consent)
  • 19. Joke Programs • Ordinary executable programs. • Created to make fun of users. • These programs do not intend to destroy data
  • 20. Some Characteristics: • Similar to ordinary executable programs • Will not infect other programs • Will not do any damage directly • May annoy or tease the user • May be difficult to halt or terminate • May cause some devices (e.g., mouse or keyboard) to temporarily function abnormally Joke Programs
  • 22. Malware Droppers Upon execution, this malware will drop a virus or other malware. When the dropped malware is executed, it can infect files or cause damage A program that drops a virus or other malware
  • 24. Backdoors Backdoors A backdoor is a program that opens secret access to systems, and is often used to bypass system security.
  • 25. Backdoors Here are some of the things that these Here are some of the things that these backdoors are capable of: backdoors are capable of:  Log keystrokes  Edit or delete files and folders  Edit the registry  Send out confidential information such as password to the hacker  Run programs on the host or target machine  Restart or shut down the computer  Capture screens  Browse and send out files to the hacker  Change computer settings such as wallpaper  Kill or disable running programs