SlideShare a Scribd company logo
1 of 15
Viruses allow the intruders to access the computer
system and resources. Viruses enter into the computer
system without the user’s permission or knowledge.
Viruses are computer programme that can replicate
itself and infect the computer.
The purpose of virus may be destructive. It includes
slow down the computer system and destroying the hard
disk.
Structure of Virus
Virus
Replication Payload Trigger
It describes the way in which virus spread .
It is the first stage through which the virus propagates.
Virus mainly spread through email attachments or
viruses attach them to the download such as movie etc.
It contain intended action or actual purpose.
The payload can create accidental or intentional
damage.
It describe the mechanism by which payload is activated.
The payload is triggered or activated on same conditions
which include certain date or time, opening an email
attachment etc.
Trigger component us related to infection mechanism
means that virus needs to be executed.
Virus
Dormant
Phase
Propagation
Phase
Triggering
Phase
Executing
Phase
 Dormant Phase
In this phase virus remains idle. It includes that virus
doing nothing until the user executes the file
 Propagation Phase
In this phase virus gets activated and starts replicating
itself. In this virus places a copy of itself into another
programme or into certain areas in the disk.
In this virus executed its payload. In this virus performs
the actual function which may be harmful.
In this virus gets activated to perform the function for
which it was intended. The event for which virus was
waiting gets initialized
Types of
virus
Boot Sector
Virus
Partite or
Multi
Partite
Virus
Stealth
Virus
Macro
Virus
File
Infector
Virus
File Infector virus
These type of virus attach themselves to files or these
virus basically attack the executable file. It is further
divided into different categories:-
Direct Action File Infector
Resident Infectors
Boot Sector Virus
This virus is always executed and locate in the memory
when the system start. It infects the hard drive of the
computer. These virus replace boot sector programme
with corrupted version.
Macro Virus
It is a virus that is written in macro language. Macro
language is mixed with software application like MS-
Word and MS-Excel.
These virus infect both boot sector and programme files. It
is difficult to repair. In this boot area and files must both
be cleaned of virus or re-infection will occur.
In this movement of virus is quite and careful in order not
to be seen or heard
Tips to Combat Virus
The operating system, applications and software of
computer system should be update.
Firewalls should be used.
Anti-virus must be installed in the computer system.
E –mail programme should not be set to auto run
attachment.
Each file and software should be scanned before
downloading.
Virus

More Related Content

What's hot (20)

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Malware
MalwareMalware
Malware
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Malicious
MaliciousMalicious
Malicious
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
What is malware
What is malwareWhat is malware
What is malware
 
Antivirus
AntivirusAntivirus
Antivirus
 

Similar to Virus

Similar to Virus (20)

Virus
VirusVirus
Virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 

More from Sapna Gupta

Hospitality sector
Hospitality sectorHospitality sector
Hospitality sectorSapna Gupta
 
Nestle marketing mix
Nestle marketing mixNestle marketing mix
Nestle marketing mixSapna Gupta
 
Balanced scorecard and fund flow statement
Balanced scorecard and fund flow statementBalanced scorecard and fund flow statement
Balanced scorecard and fund flow statementSapna Gupta
 
Presentation on Google pay
Presentation on Google payPresentation on Google pay
Presentation on Google paySapna Gupta
 
Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)Sapna Gupta
 

More from Sapna Gupta (10)

Hospitality sector
Hospitality sectorHospitality sector
Hospitality sector
 
Business law
Business lawBusiness law
Business law
 
Nestle marketing mix
Nestle marketing mixNestle marketing mix
Nestle marketing mix
 
Financial mgt.
Financial mgt.Financial mgt.
Financial mgt.
 
Organising
OrganisingOrganising
Organising
 
Winding up
Winding upWinding up
Winding up
 
Wto & gatt
Wto & gattWto & gatt
Wto & gatt
 
Balanced scorecard and fund flow statement
Balanced scorecard and fund flow statementBalanced scorecard and fund flow statement
Balanced scorecard and fund flow statement
 
Presentation on Google pay
Presentation on Google payPresentation on Google pay
Presentation on Google pay
 
Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)Ndtl (Net deamnd and time liability)
Ndtl (Net deamnd and time liability)
 

Recently uploaded

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Recently uploaded (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Virus

  • 1.
  • 2. Viruses allow the intruders to access the computer system and resources. Viruses enter into the computer system without the user’s permission or knowledge. Viruses are computer programme that can replicate itself and infect the computer. The purpose of virus may be destructive. It includes slow down the computer system and destroying the hard disk.
  • 4. It describes the way in which virus spread . It is the first stage through which the virus propagates. Virus mainly spread through email attachments or viruses attach them to the download such as movie etc.
  • 5. It contain intended action or actual purpose. The payload can create accidental or intentional damage.
  • 6. It describe the mechanism by which payload is activated. The payload is triggered or activated on same conditions which include certain date or time, opening an email attachment etc. Trigger component us related to infection mechanism means that virus needs to be executed.
  • 8.  Dormant Phase In this phase virus remains idle. It includes that virus doing nothing until the user executes the file  Propagation Phase In this phase virus gets activated and starts replicating itself. In this virus places a copy of itself into another programme or into certain areas in the disk.
  • 9. In this virus executed its payload. In this virus performs the actual function which may be harmful. In this virus gets activated to perform the function for which it was intended. The event for which virus was waiting gets initialized
  • 10. Types of virus Boot Sector Virus Partite or Multi Partite Virus Stealth Virus Macro Virus File Infector Virus
  • 11. File Infector virus These type of virus attach themselves to files or these virus basically attack the executable file. It is further divided into different categories:- Direct Action File Infector Resident Infectors
  • 12. Boot Sector Virus This virus is always executed and locate in the memory when the system start. It infects the hard drive of the computer. These virus replace boot sector programme with corrupted version. Macro Virus It is a virus that is written in macro language. Macro language is mixed with software application like MS- Word and MS-Excel.
  • 13. These virus infect both boot sector and programme files. It is difficult to repair. In this boot area and files must both be cleaned of virus or re-infection will occur. In this movement of virus is quite and careful in order not to be seen or heard
  • 14. Tips to Combat Virus The operating system, applications and software of computer system should be update. Firewalls should be used. Anti-virus must be installed in the computer system. E –mail programme should not be set to auto run attachment. Each file and software should be scanned before downloading.