SlideShare a Scribd company logo
1 of 17
Computer Virus
Prepare by- Shripati pritam sahoo
Date:-may,2023
Table of Content
 History
 What is computer virus
 Symptoms
 Types of computer virus
 The spread of the virus
 What computer virus do
 Preventation from computer virus
 Best antivirus software
 Conclusion
History of computer virus
 The first computer virus was called creeper.It was
invented in the early 1970’s. Since then, millions
of viruses have been invented.
 The first known computer virus was written in
1981 by a man named Rich Skrenta. This virus
was termed Elk Cloner, and was the first computer
virus to appear outside the computer where it was
created in.
What is computer virus
 A computer virus is a malicious application used to
perform destructive activity on a device or local
network.
 The code’s malicious activity could damage the local
file system, steal data, interrupt services, download
additional malware, or any other actions coded into
the program by the malware author.
Symptoms
 Your computer or web browser has dramatically slowed down over a period of
a few days/a week
 Frequent freezing or crashing
 Modified or deleted files
 New programs or desktop icons that you do not recall installing/creating
 Programs running without your consent
 Programs closing without your consent
 Changes in your security settings
 Unusual emails/social media messages being sent without your permission to a
large audience
 Your default search engine has been changed without you altering it
 New toolbars in the web browser
 Browser links redirect to the wrong web page
Types of Computer virus
There are eight main virus types, some of which could be packaged with
other malware to increase the chance of infection and damage. The 8
major categories for viruses are:
1.Boot Sector virus- A boot sector virus damages or controls the boot sector on
the drive, rendering the machine unusable.
2.Direct action virus-When a user executes a harmless file attached with
malicious code, direct action viruses deliver a payload immediately.
3.Web scripting virus-Most browsers have defenses against malicious web
scripts, but older, unsupported browsers that allow an attacker to run code
on the local device.
4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus
to detect and remove them
5.File infector virus-A threat actor uses file infector viruses to inject malicious
code into critical files that run the operating system or important programs
6.Browser hijacker- A virus that can change the settings on your browser
will hijack browser favorites, the home page URL and redirect you to a
malicious site
7.Resident virus- A virus that can access computer memory and sit until
a payload is delivered is considered a resident virus.
8.Macro virus- Microsoft Office files can run macros, and these macros
can be used to download additional malware or run malicious code. Macro
viruses deliver a payload when the file is opened, and the macro runs.
Latest viruses
 DEXTER-
 Dexter is a computer virus or point of sale
malware which infects computers running Microsoft
Windows and was discovered by IT security, in
December 2012.
 It infects PoS(point of sale) systems worldwide and
steals sensitive information such as Credit Card and
Debit Card information.
 REVETON-
1.In 2012, a major ransomware know as Reveton
began to spread.
2 .Reveton is a malware which attempts to extort
money from a user.
3 .It Claims that your computer has been used for
unauthorized activites.
 CRYPTOLOCKER-
1.encrypting ransomware appeard in 2013 known
as Crypto Locker.
2.cryptolocker demands a pyment with either a
moneyPak card or Bitcoin to recover the key.
3.cryptolocker to be extremely difficult to repair.
The spread of the virus
1.Infected applications move from one computer to
another easily because users are unaware their
application is infected and will share, transfer, or install
them without a care in the world.
2.Some users are unaware that their email software is
being controlled by the virus (mail hijack) and viruses
are actually emailing themselves to the contacts in the
email contacts list.
3.Users can also download viruses if they are using
pirated apps, or have accessed an infected code
repository.
What does a computer virus do?
The way a computer virus acts depends on how it’s coded. It could
be something as simple as a prank that doesn’t cause any damage,
or it could be leading to criminal activity and fraud. Many viruses
only affect a local device, but others spread across a network
environment to find other hosts.
How to prevent computer viruses
 Install antivirus software: Antivirus should run on
any device connected to the network. It’s your first
defense against viruses. Antivirus software stops
malware executables from running on your local
device.
 Don’t open executable email attachments: Many
malware attacks including ransomware start with a
malicious email attachment. Executable attachments
should never be opened, and users should avoid
running macros programmed into files such as
Microsoft Word or Excel.
 Keep your operating system updated: Developers for all
major operating systems release patches to remediate common
bugs . Always keep your operating system updated and stop
using end-of-life versions (e.g., Windows 7 or Windows XP).
 Avoid questionable websites: You should always keep your
browser updated with the latest patches, but avoiding these
sites will stop drive-by downloads or redirecting you to sites that
host malware.
 Don’t use pirated software: Free pirated software might be
tempting, but it’s often packaged with malware. Download
vendor software only from the official source and avoid using
software that’s pirated and shared.
Best antivirus software
1.McAfee
2.Nortan
3.TOTALAV
4.Intego
5.Bitdefender
6.Panda
7.PROTECT
Conclusion
In our technology- dependent society, the computer
is the mastert it controls our entertainment, our
power plants, our military and much more.
However, because of the dependency on the
computer and other technologies, the virus can easily
do millions or even billions of dollars in damage.
THANK YOU

More Related Content

Similar to computervirus.ppt

Similar to computervirus.ppt (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
viruses
virusesviruses
viruses
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus project
Virus projectVirus project
Virus project
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

computervirus.ppt

  • 1. Computer Virus Prepare by- Shripati pritam sahoo Date:-may,2023
  • 2. Table of Content  History  What is computer virus  Symptoms  Types of computer virus  The spread of the virus  What computer virus do  Preventation from computer virus  Best antivirus software  Conclusion
  • 3. History of computer virus  The first computer virus was called creeper.It was invented in the early 1970’s. Since then, millions of viruses have been invented.  The first known computer virus was written in 1981 by a man named Rich Skrenta. This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 4. What is computer virus  A computer virus is a malicious application used to perform destructive activity on a device or local network.  The code’s malicious activity could damage the local file system, steal data, interrupt services, download additional malware, or any other actions coded into the program by the malware author.
  • 5. Symptoms  Your computer or web browser has dramatically slowed down over a period of a few days/a week  Frequent freezing or crashing  Modified or deleted files  New programs or desktop icons that you do not recall installing/creating  Programs running without your consent  Programs closing without your consent  Changes in your security settings  Unusual emails/social media messages being sent without your permission to a large audience  Your default search engine has been changed without you altering it  New toolbars in the web browser  Browser links redirect to the wrong web page
  • 6. Types of Computer virus There are eight main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The 8 major categories for viruses are: 1.Boot Sector virus- A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. 2.Direct action virus-When a user executes a harmless file attached with malicious code, direct action viruses deliver a payload immediately. 3.Web scripting virus-Most browsers have defenses against malicious web scripts, but older, unsupported browsers that allow an attacker to run code on the local device. 4.Polymorphic virus-Polymorphic viruses make it more difficult for an antivirus to detect and remove them 5.File infector virus-A threat actor uses file infector viruses to inject malicious code into critical files that run the operating system or important programs
  • 7. 6.Browser hijacker- A virus that can change the settings on your browser will hijack browser favorites, the home page URL and redirect you to a malicious site 7.Resident virus- A virus that can access computer memory and sit until a payload is delivered is considered a resident virus. 8.Macro virus- Microsoft Office files can run macros, and these macros can be used to download additional malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the macro runs.
  • 8. Latest viruses  DEXTER-  Dexter is a computer virus or point of sale malware which infects computers running Microsoft Windows and was discovered by IT security, in December 2012.  It infects PoS(point of sale) systems worldwide and steals sensitive information such as Credit Card and Debit Card information.
  • 9.  REVETON- 1.In 2012, a major ransomware know as Reveton began to spread. 2 .Reveton is a malware which attempts to extort money from a user. 3 .It Claims that your computer has been used for unauthorized activites.
  • 10.  CRYPTOLOCKER- 1.encrypting ransomware appeard in 2013 known as Crypto Locker. 2.cryptolocker demands a pyment with either a moneyPak card or Bitcoin to recover the key. 3.cryptolocker to be extremely difficult to repair.
  • 11. The spread of the virus 1.Infected applications move from one computer to another easily because users are unaware their application is infected and will share, transfer, or install them without a care in the world. 2.Some users are unaware that their email software is being controlled by the virus (mail hijack) and viruses are actually emailing themselves to the contacts in the email contacts list. 3.Users can also download viruses if they are using pirated apps, or have accessed an infected code repository.
  • 12. What does a computer virus do? The way a computer virus acts depends on how it’s coded. It could be something as simple as a prank that doesn’t cause any damage, or it could be leading to criminal activity and fraud. Many viruses only affect a local device, but others spread across a network environment to find other hosts.
  • 13. How to prevent computer viruses  Install antivirus software: Antivirus should run on any device connected to the network. It’s your first defense against viruses. Antivirus software stops malware executables from running on your local device.  Don’t open executable email attachments: Many malware attacks including ransomware start with a malicious email attachment. Executable attachments should never be opened, and users should avoid running macros programmed into files such as Microsoft Word or Excel.
  • 14.  Keep your operating system updated: Developers for all major operating systems release patches to remediate common bugs . Always keep your operating system updated and stop using end-of-life versions (e.g., Windows 7 or Windows XP).  Avoid questionable websites: You should always keep your browser updated with the latest patches, but avoiding these sites will stop drive-by downloads or redirecting you to sites that host malware.  Don’t use pirated software: Free pirated software might be tempting, but it’s often packaged with malware. Download vendor software only from the official source and avoid using software that’s pirated and shared.
  • 16. Conclusion In our technology- dependent society, the computer is the mastert it controls our entertainment, our power plants, our military and much more. However, because of the dependency on the computer and other technologies, the virus can easily do millions or even billions of dollars in damage.