SlideShare a Scribd company logo
1 of 8
DIGITAL FLUENCY
DIGITAL FLUENCY DIGUGGGGGGGGGITAL FLUENCY
NAME: S.LINGESHWAR
TOPIC : VIRUSES AND DIFFERENT TYPES OF
THREATS
FROM: 1st YEAR BCOM ‘F’ SECTION
INTRODUCTIONVIRUS
A COMPUTER VIRUS IS A TYPE OF COMPUTER
PROGRAM THAT,WHEN EXECUTED,REPLICATES ITSELF
BY MODIFYING OTHER COMPUTER PROGRAMS AND
INSERTING ITS OWN CODE. IF THIS REPLICATION
SUCCEEDS,THE AFFECTED AREAS ARE THEN SAID TO BE
“INFECTED” WITH A COMPUTER VIRUS.
IN SHORT, A COMPUTER VIRUS IS A TYPE OF
MALICIOUS{INTENTION TO HARM} SOFTWARE, OR
MALWARE,THAT SPREADS BETWEEN COMPUTERS AND
CAUSES DAMAGE TO DATA AND SOFTWARE. ITS MAIN AIM
IS TO DISRUPT SYSTEM, CAUSE OPERATIONAL ISSUES
,AND RESULT IN DATA LOSS AND LEAKAGE.
CATEGORIES OF VIRUS
VIRUSES ARE MAINLY CLASSIFIED INTO THREE MAIN CATEGORIES
OR TYPES, THEY ARE:
MACRO VIRUS : THESE ARE THE LARGEST TYPES OF THE
THREE TYPES.THEY USE BUILD-IN PROGRAMMING SCRIPTS IN
SUCH APPLICATIONS AS MICROSOFT EXCEL , WORD TO AUTOMATE
THE TASKS.WHEN AN UNSUSPECTING USER OPENS A DOCUMENT
INFECTED BY A MACRO VIRUS, THEY GIVE IT THE GREEN LIGHT TO
MAKE COPIES OF ITSELF IN OTHER DOCUMENTS AND MULTIPLY.
BOOT RECORD INFECTORS : THESE VIRUSES
ARE KNOWN ALSO AS BOOT VIRUSES OR SYSTEM
VIRUSES. THEY ATTACK PROGRAMS STORED ON
BOOTABLE FLOPPY OR HARD DISKS. EVERY TIME
A USER BOOTS UP, THE VIRUS-INFECTED CODE AUTOMATICALLY
RUN AS WELL . THIS GIVES HACKERS FULL CONTROL OF AN ENTIRE
SYSTEM AND LETS EXACTLY DO WHAT THEY WANT WITH IT. BOOT
RECORD INFECTORS CAN BE SPREAD FROM ONE INFECTED
BOOTABLE DISK TO ANOTHER.
• FILE INFECTORS : THESE VIRUSES TARGET .EXE OR .COM
FILES AND CHANGES THEM. FILE INFECTORS GET ACTIVATED
EVERY TIME USERS RUN A COMPROMISED PROGRAM. WHAT
MAKES THIS TYPE OF VIRUS ESPECIALLY INSIDIOUS IS THAT IT
CAN SIMPLY STAY INACTIVE IN THE MEMORY UNTIL IT GETS A
CUE TO INFECT OTHER PROGRAM FILES. THESE VIRUSES CAN
GET TRANSMITTED OVER NETWORKS, THE INTERNET OR BY
USING INFECTED DISKS.
VARIOUS TYPES OF THREATS TO THE
COMPUTERS
COMPUTER SECURITY THREAT CAN REFER TO ANYTHING WHICH CAN HAMPER THE NORMAL
ACTIVITY OF A PC EITHER VIA A MALWARE OR ANY HACKING ATTACK.
TYPES OF COMPUTER SECURITY THREATS
THERE ARE SEVERAL TYPES OF COMPUTER SECURITY THREATS SUCH AS TROJANS, VIRUS,
ADWARE, MALWARE, ROOTKIT, HACKERS AND MUCH MORE. CHECK SOME OF THE MOST
HARMFUL TYPES OF COMPUTER SECURITY THREATS.
COMPUTER VIRUS
A COMPUTER VIRUS IS A MALICIOUS PROGRAM, WHICH REPLICATES ITSELF AND INFECTS THE
FILES AND PROGRAMS OF YOUR PC AND CAN MAKE THEM NON-FUNCTIONAL.
COMPUTER WORMS
A SELF-REPLICATING COMPUTER PROGRAM THAT SPREADS MALICIOUS CODES, COMPUTER
WORMS MAKE USE OF THE NETWORK TO SEND COPIES OF THE ORIGINAL CODES TO OTHER
PCS. IT CAN ALSO GO TO THE EXTENT OF SENDING TRANSFERRING DOCUMENTS UTILIZING
THE EMAIL OF THE USER.
SCAREWARE
SCAREWARE IS A MALWARE THAT TRICKS VICTIMS TO BUY THE SOFTWARE BY DISPLAYING FAKE
VIRUS ALERTS. A SCAREWARE INFECTED PC MAY GET POP-UPS OF FAKE MALWARE THREATS
AND TO GET RID OF THOSE, USERS ARE PROMPTED TO PURCHASE A FAKE ANTI-MALWARE
SOFTWARE.
KEYLOGGER
ALSO KNOWN AS A KEYSTROKE LOGGER, KEYLOGGERS CAN TRACK
THE REAL-TIME ACTIVITY OF A USER ON HIS COMPUTER.
KEYLOGGER RUNS IN THE BACKGROUND AND RECORDS ALL
KEYSTROKES MADE BY A USER AND PASSES THE INFORMATION TO
THE HACKER WITH THE MOTIVE TO STEAL PASSWORD AND
BANKING DETAILS.
ROOTKIT
ROOTKIT IS CONSIDERED EXTREMELY DANGEROUS AS THEY
APPEAR TO BE LEGITIMATE FILES AND DECEIVES THE COMPUTER
USER. ROOTKIT MASKS VIRUSES AND WORMS AND MAKES THEM
APPEAR AS NECESSARY FILES. THESE ARE VERY DIFFICULT TO
REMOVE AND ONLY AN ANTIVIRUS WITH THE ANTI-ROOTKIT
FEATURE CAN REMOVE A ROOTKIT.
PREVENTION OF COMPUTER FROM ITS THREATS
1. INCULCATE A HABIT OF NOT USING PASSWORDS BUT START USING PASSPHRASES.
THIS WILL SECURE THE AUTHENTICATION AND HELPS YOU STAY SAFE.
2. ACTIVATE WINDOWS FIREWALLS SO THAT THE SECURITY BARRIER IS RAISED TO
NEXT LEVEL.
3. INVEST IN GOOD ANTIVIRUS AND ANTI-MALWARE SOFTWARE
4. STOP INSTALLING CRACKED SOFTWARE, IF NOT THEN IT WILL OPEN DOORS FOR A
LOT OF SPYWARE INSTALLATION.
5. IF YOU ARE USING ONLINE STORAGE SPACES LIKE, GOOGLE DRIVE, DROPBOX THEN
PLEASE MAKE SURE YOU ENCRYPT YOUR DATA BY USING ONLINE ENCRYPTED
SERVICES. THIS WAY IF THESE BIG COMPANIES HAVE FACE ANY DATA BREACH YOU
DON'T HAVE TO WORRY ABOUT YOUR DATA LOSS.
6. SECURE YOUR WIFI NETWORKS WITH SECURE PASSPHRASE RATHER THAN A
PASSWORD AND MAKE SURE THE NETWORK IS WPA2 ENCRYPTION.
7. MAKE SURE YOUR SOCIAL MEDIA SETTINGS ARE APPROPRIATE.
8. SECURE YOUR MOBILE PHONE'S, ALWAYS MAKE A HABIT TO DOWNLOAD APPS
FROM GOOGLE PLAY STORE OR APPLE STORE.
9. PLEASE DO NOT STORE YOUR CREDIT CARD OR DEBIT CARD DETAILS ON
WEBSITES.
10. IF YOU GOT HACKED, PLEASE DO NOT PANIC, PLEASE CONSULT AN
APPROPRIATE ETHICAL HACKER OR HELP FROM YOUR IT TEAM.
11. NEVER TRUST EMAILS, A LOT OF FAKE EMAILS ARE SENT OUT BY HACKERS
THAT YOU HAVE WON X NUMBER OF DOLLARS. IN REALITY, THEY USE YOUR
PERSONAL INFORMATION AND TRY TO HACK INTO YOUR BANK ACCOUNTS AND
STEAL YOUR HARD EARNED MONEY.
CONCLUSION
SO AS THE TECHNOLOGY ADVANCEMENT HAS BEEN OBSERVED WE
HAVE ALSO EXPERIENCED A HUGE AMOUNT OF CYBER SECURITY
THREATS THAT ARE EXPOSED TO A SINGLE INDIVIDUAL AND AT
THE SAME TIME ORGANIZATIONS ARE ALSO AFFECTED. SO ONE
HAS TO MAKE SURE THAT THEY UNDERSTAND THAT THEIR
PERSONAL INFORMATION IS VITAL AND AT ANY COST, IT
SHOULDN’T BE COMPROMISED. THE INDIVIDUALS SHOULD BE
EDUCATED AND TRAINED TO USE AT LEAST MINIMUM SECURITY
STANDARDS IN THEIR DAILY CHORUS.

More Related Content

Similar to VIRUS AND ITS TYPES.pptx

Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 

Similar to VIRUS AND ITS TYPES.pptx (20)

MALWARE
MALWAREMALWARE
MALWARE
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Information security
Information securityInformation security
Information security
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

VIRUS AND ITS TYPES.pptx

  • 1. DIGITAL FLUENCY DIGITAL FLUENCY DIGUGGGGGGGGGITAL FLUENCY NAME: S.LINGESHWAR TOPIC : VIRUSES AND DIFFERENT TYPES OF THREATS FROM: 1st YEAR BCOM ‘F’ SECTION
  • 2. INTRODUCTIONVIRUS A COMPUTER VIRUS IS A TYPE OF COMPUTER PROGRAM THAT,WHEN EXECUTED,REPLICATES ITSELF BY MODIFYING OTHER COMPUTER PROGRAMS AND INSERTING ITS OWN CODE. IF THIS REPLICATION SUCCEEDS,THE AFFECTED AREAS ARE THEN SAID TO BE “INFECTED” WITH A COMPUTER VIRUS. IN SHORT, A COMPUTER VIRUS IS A TYPE OF MALICIOUS{INTENTION TO HARM} SOFTWARE, OR MALWARE,THAT SPREADS BETWEEN COMPUTERS AND CAUSES DAMAGE TO DATA AND SOFTWARE. ITS MAIN AIM IS TO DISRUPT SYSTEM, CAUSE OPERATIONAL ISSUES ,AND RESULT IN DATA LOSS AND LEAKAGE.
  • 3. CATEGORIES OF VIRUS VIRUSES ARE MAINLY CLASSIFIED INTO THREE MAIN CATEGORIES OR TYPES, THEY ARE: MACRO VIRUS : THESE ARE THE LARGEST TYPES OF THE THREE TYPES.THEY USE BUILD-IN PROGRAMMING SCRIPTS IN SUCH APPLICATIONS AS MICROSOFT EXCEL , WORD TO AUTOMATE THE TASKS.WHEN AN UNSUSPECTING USER OPENS A DOCUMENT INFECTED BY A MACRO VIRUS, THEY GIVE IT THE GREEN LIGHT TO MAKE COPIES OF ITSELF IN OTHER DOCUMENTS AND MULTIPLY. BOOT RECORD INFECTORS : THESE VIRUSES ARE KNOWN ALSO AS BOOT VIRUSES OR SYSTEM VIRUSES. THEY ATTACK PROGRAMS STORED ON BOOTABLE FLOPPY OR HARD DISKS. EVERY TIME A USER BOOTS UP, THE VIRUS-INFECTED CODE AUTOMATICALLY RUN AS WELL . THIS GIVES HACKERS FULL CONTROL OF AN ENTIRE SYSTEM AND LETS EXACTLY DO WHAT THEY WANT WITH IT. BOOT RECORD INFECTORS CAN BE SPREAD FROM ONE INFECTED BOOTABLE DISK TO ANOTHER.
  • 4. • FILE INFECTORS : THESE VIRUSES TARGET .EXE OR .COM FILES AND CHANGES THEM. FILE INFECTORS GET ACTIVATED EVERY TIME USERS RUN A COMPROMISED PROGRAM. WHAT MAKES THIS TYPE OF VIRUS ESPECIALLY INSIDIOUS IS THAT IT CAN SIMPLY STAY INACTIVE IN THE MEMORY UNTIL IT GETS A CUE TO INFECT OTHER PROGRAM FILES. THESE VIRUSES CAN GET TRANSMITTED OVER NETWORKS, THE INTERNET OR BY USING INFECTED DISKS.
  • 5. VARIOUS TYPES OF THREATS TO THE COMPUTERS COMPUTER SECURITY THREAT CAN REFER TO ANYTHING WHICH CAN HAMPER THE NORMAL ACTIVITY OF A PC EITHER VIA A MALWARE OR ANY HACKING ATTACK. TYPES OF COMPUTER SECURITY THREATS THERE ARE SEVERAL TYPES OF COMPUTER SECURITY THREATS SUCH AS TROJANS, VIRUS, ADWARE, MALWARE, ROOTKIT, HACKERS AND MUCH MORE. CHECK SOME OF THE MOST HARMFUL TYPES OF COMPUTER SECURITY THREATS. COMPUTER VIRUS A COMPUTER VIRUS IS A MALICIOUS PROGRAM, WHICH REPLICATES ITSELF AND INFECTS THE FILES AND PROGRAMS OF YOUR PC AND CAN MAKE THEM NON-FUNCTIONAL. COMPUTER WORMS A SELF-REPLICATING COMPUTER PROGRAM THAT SPREADS MALICIOUS CODES, COMPUTER WORMS MAKE USE OF THE NETWORK TO SEND COPIES OF THE ORIGINAL CODES TO OTHER PCS. IT CAN ALSO GO TO THE EXTENT OF SENDING TRANSFERRING DOCUMENTS UTILIZING THE EMAIL OF THE USER. SCAREWARE SCAREWARE IS A MALWARE THAT TRICKS VICTIMS TO BUY THE SOFTWARE BY DISPLAYING FAKE VIRUS ALERTS. A SCAREWARE INFECTED PC MAY GET POP-UPS OF FAKE MALWARE THREATS AND TO GET RID OF THOSE, USERS ARE PROMPTED TO PURCHASE A FAKE ANTI-MALWARE SOFTWARE.
  • 6. KEYLOGGER ALSO KNOWN AS A KEYSTROKE LOGGER, KEYLOGGERS CAN TRACK THE REAL-TIME ACTIVITY OF A USER ON HIS COMPUTER. KEYLOGGER RUNS IN THE BACKGROUND AND RECORDS ALL KEYSTROKES MADE BY A USER AND PASSES THE INFORMATION TO THE HACKER WITH THE MOTIVE TO STEAL PASSWORD AND BANKING DETAILS. ROOTKIT ROOTKIT IS CONSIDERED EXTREMELY DANGEROUS AS THEY APPEAR TO BE LEGITIMATE FILES AND DECEIVES THE COMPUTER USER. ROOTKIT MASKS VIRUSES AND WORMS AND MAKES THEM APPEAR AS NECESSARY FILES. THESE ARE VERY DIFFICULT TO REMOVE AND ONLY AN ANTIVIRUS WITH THE ANTI-ROOTKIT FEATURE CAN REMOVE A ROOTKIT.
  • 7. PREVENTION OF COMPUTER FROM ITS THREATS 1. INCULCATE A HABIT OF NOT USING PASSWORDS BUT START USING PASSPHRASES. THIS WILL SECURE THE AUTHENTICATION AND HELPS YOU STAY SAFE. 2. ACTIVATE WINDOWS FIREWALLS SO THAT THE SECURITY BARRIER IS RAISED TO NEXT LEVEL. 3. INVEST IN GOOD ANTIVIRUS AND ANTI-MALWARE SOFTWARE 4. STOP INSTALLING CRACKED SOFTWARE, IF NOT THEN IT WILL OPEN DOORS FOR A LOT OF SPYWARE INSTALLATION. 5. IF YOU ARE USING ONLINE STORAGE SPACES LIKE, GOOGLE DRIVE, DROPBOX THEN PLEASE MAKE SURE YOU ENCRYPT YOUR DATA BY USING ONLINE ENCRYPTED SERVICES. THIS WAY IF THESE BIG COMPANIES HAVE FACE ANY DATA BREACH YOU DON'T HAVE TO WORRY ABOUT YOUR DATA LOSS. 6. SECURE YOUR WIFI NETWORKS WITH SECURE PASSPHRASE RATHER THAN A PASSWORD AND MAKE SURE THE NETWORK IS WPA2 ENCRYPTION. 7. MAKE SURE YOUR SOCIAL MEDIA SETTINGS ARE APPROPRIATE. 8. SECURE YOUR MOBILE PHONE'S, ALWAYS MAKE A HABIT TO DOWNLOAD APPS FROM GOOGLE PLAY STORE OR APPLE STORE. 9. PLEASE DO NOT STORE YOUR CREDIT CARD OR DEBIT CARD DETAILS ON WEBSITES. 10. IF YOU GOT HACKED, PLEASE DO NOT PANIC, PLEASE CONSULT AN APPROPRIATE ETHICAL HACKER OR HELP FROM YOUR IT TEAM. 11. NEVER TRUST EMAILS, A LOT OF FAKE EMAILS ARE SENT OUT BY HACKERS THAT YOU HAVE WON X NUMBER OF DOLLARS. IN REALITY, THEY USE YOUR PERSONAL INFORMATION AND TRY TO HACK INTO YOUR BANK ACCOUNTS AND STEAL YOUR HARD EARNED MONEY.
  • 8. CONCLUSION SO AS THE TECHNOLOGY ADVANCEMENT HAS BEEN OBSERVED WE HAVE ALSO EXPERIENCED A HUGE AMOUNT OF CYBER SECURITY THREATS THAT ARE EXPOSED TO A SINGLE INDIVIDUAL AND AT THE SAME TIME ORGANIZATIONS ARE ALSO AFFECTED. SO ONE HAS TO MAKE SURE THAT THEY UNDERSTAND THAT THEIR PERSONAL INFORMATION IS VITAL AND AT ANY COST, IT SHOULDN’T BE COMPROMISED. THE INDIVIDUALS SHOULD BE EDUCATED AND TRAINED TO USE AT LEAST MINIMUM SECURITY STANDARDS IN THEIR DAILY CHORUS.