SlideShare a Scribd company logo
1 of 22
Download to read offline
Information & Communication
Technology (ICT)
Computer-aided design (CAD)
&
Computer Aided Manufacturing (CAM)
DIT Part 1
Lecture 19
Copyrights By Tanveer Malik
Computer Virus
• A computer virus is a computer program that
can copy itself and infect a computer without
the permission or knowledge of the owner.
• One of the first detected virus was the
Creeper virus in the early 70’s
• Before computer networks became
widespread, most viruses spread on
removable media, particularly floppy disk.
Copyrights By Tanveer Malik
Computer Virus
• A virus is a small piece of software that
piggybacks on real programs in order to get
executed
• Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
Copyrights By Tanveer Malik
Basic Computer Viruses
• Trojan Horses
– appears as interesting program file but when installed it
allows intruders to access and read your files
• Worms
– virus that copies and multiplies itself by using computer
networks and security flaws
• E-mail Viruses
– use e-mail messages to spread which allow it to
automatically forward itself to thousands
of people
Copyrights By Tanveer Malik
Types of Viruses
• Boot Sector Virus
– Infects the boot or MBR of diskettes and hard drives through the
sharing of infected disks and pirated software applications
– Once your hard drive is infected all diskettes that you use in your
computer will be infected
• Program Virus
– Becomes active when the program file (usually with extensions .BIN,
.COM, .EXE, .OVL, .DRV) carrying the virus is opened
– It then makes copies of itself and will infect other programs on the
computer
• Multipartite Virus
– Hybrid of a Boot Sector and Program viruses
– It infects program files and when the infected program is active it will
affect the boot record
Copyrights By Tanveer Malik
Types of Viruses
• Stealth Virus
– Disguises itself to prevent from being detected by antivirus software
– It alters its file size or conceals itself in memory
• Polymorphic Virus
– Act like a chameleon, changing its virus signature (binary pattern)
every time it multiples and infects a new file
• Macro Virus
– Programmed as a macro embedded in a document, usually found in
Microsoft Word and Excel
– Once it gets in to your computer, every document you produce will
become infected
– Relatively new type of virus and may slip by your antivirus software if
you don't have the most recent version installed
Copyrights By Tanveer Malik
Signs Your Computer is Infected
• Functions slower than normal
• Responds slowly and freezes
often
• Restarts itself often
• See uncommon error messages,
distorted menus, and dialog boxes
• Notice applications fail to work correctly
• Fail to print correctly
Copyrights By Tanveer Malik
Total Number of Viruses By Bear
January 1985 1
January 1985 1
January 1987 3
January 1989 6
January 1990 142
January 1991 357
January 1992 1,161
January 1993 2,482
January 1994 3,687
January 1995 5,626
January 1996 7,764
January 1997 11,037
January 1998 16,726
January 1999 40,850
January 2000 44,000
January 2001 48,000
January 2002 55,000
January 2003 62,000
Copyrights By Tanveer Malik
Melissa
• Another virus that fired up the media was Melissa, a Word
macro virus.
• When people received the host Word document via email
and opened it, the virus sent a copy of itself to the first 50
people in the victim's address book.
• Named after a topless dancer in Florida, the Melissa virus
crashed the email servers of corporations and governments
in different spots around the world.
• The Computer Emergency Response Team, set up after
Robert Morris mucked up the Internet with his worm in
1988, estimated that the virus hit 100,000 computers in its
first weekend.
• David L. Smith posted the infected file to an alt.sex usenet
group using a stolen AOL account. Initially he entered a
plea of innocence, but after being confronted with a
maximum sentence of 40 years in prison, he eventually
pled guilty and received a much-reduced sentence.
Copyrights By Tanveer Malik
Love You, Love Bug
• By almost any measure, the so-called Love Bug
was the most damaging and costly virus ever.
• We don't know who comes up with these whack
figures, but according to Reuters the bug cost the
world $15 billion in lost productivity.
The Love Bug spread far faster than Melissa.
• Unlike Melissa, it would mail itself to everyone in
your Outlook address book -- most of whom
would probably be delighted to read about how
you love them -- not just the first fifty.
• Moreover, it would gobble up certain media files
stored on your hard drive.
Copyrights By Tanveer Malik
Did you know
• One German newspaper
tragically lost 2,000 pictures
from its archive.
• The perpetrator turned out to
be a 23-year-old Filipino
computer science student who
more or less plagiarized all of his
code.
• The lack of laws in the
Philippines covering computer
crimes, he pretty much got away
with his crime.
Copyrights By Tanveer Malik
Prevention
• Upload and use antivirus
software
• Be aware of the e-mails and
attachments you open
• Check for updates on antivirus
software regularly
• Make sure antivirus software
is installed correctly
Copyrights By Tanveer Malik
Prevention
Copyrights By Tanveer Malik
Computer Antivirus
• Antivirus or anti-virus software (often
abbreviated as AV), sometimes known as anti-
malware software, is computer software used
to prevent, detect and remove malicious
software.
• Antivirus software was originally developed to
detect and remove computer viruses, hence
the name.
Copyrights By Tanveer Malik
Computer Antivirus
• Anti-Virus Software are computer programs
that attempt to identify, neutralize or
eliminate malicious software.
• Most modern antivirus software is now
designed to combat a wide range of threats,
including worms, rootkits, Trojans, often
described collectively as malware.
Copyrights By Tanveer Malik
APPROACHES TO DETECT VIRUSES
1. THE SIGNATUREAPPROACH:
• Just like the police traces patterns in crimes
back to a criminal ,software engineers can
reverse engineer a virus to find the signature it
leaves.
• This signature is added to the database so that
when buster performs a virus scan, each file is
scanned for matches with any virus’ signature
Copyrights By Tanveer Malik
2.THE SANDBOX APPROACH:
• A ‘sandbox is an advanced program that
emulates an OS.
• A suspect executable file is run within the
confines of a sandbox and then the sandbox is
examined to see what changes were made.
APPROACHES TO DETECT VIRUSES
Copyrights By Tanveer Malik
3.THE HEURISTIC APPROACH:
• This analyses a program for ‘seemingly’
malicious behavior ,heuristics is effective
against undocumented viruses .
• The buster of the future might eliminate the
need for continual monitoring of new viruses..
APPROACHES TO DETECT VIRUSES
Copyrights By Tanveer Malik
Manual Prevention from Viruses
• Delete your browsing history, temporary internet files, internet
cookies before exiting .
• Always remember to scan any removable hardware using anti-
virus software before accessing it. Removable hardware
includes Floppy Disks, CD, USB Drive.
• Scan your computer every week using anti-virus software like
Norton, McAfee for prevention against malware
• Update your anti-virus for new and latest virus definitions.
• Create a system restore point before installing any software or
freeware.
Copyrights By Tanveer Malik
Best Market Antivirus
Copyrights By Tanveer Malik
Assignment
– History of Virus.
Evolution of Computer Viruses and Antivirus Software

More Related Content

What's hot

Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
Virus09
Virus09Virus09
Virus09defler
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 

What's hot (20)

Software theft
Software theftSoftware theft
Software theft
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
anti_virus
anti_virusanti_virus
anti_virus
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Malicious
MaliciousMalicious
Malicious
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Virus09
Virus09Virus09
Virus09
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 

Similar to Evolution of Computer Viruses and Antivirus Software

Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Computer virus
Computer virusComputer virus
Computer virusrana_babar
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS AnaniaDaxo
 
Computer viruses
Computer virusesComputer viruses
Computer virusesBabita Pant
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Computer viruses
Computer virusesComputer viruses
Computer virusesqwertyf
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 

Similar to Evolution of Computer Viruses and Antivirus Software (20)

Computer Virus
Computer Virus Computer Virus
Computer Virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 

More from Tanveer Malik

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policyTanveer Malik
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directoryTanveer Malik
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Tanveer Malik
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file systemTanveer Malik
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk managementTanveer Malik
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in networkTanveer Malik
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkTanveer Malik
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission mediaTanveer Malik
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol detailsTanveer Malik
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types rolesTanveer Malik
 

More from Tanveer Malik (20)

Lecture 12 security policy
Lecture 12 security policyLecture 12 security policy
Lecture 12 security policy
 
Lecture 11 active directory
Lecture 11 active directoryLecture 11 active directory
Lecture 11 active directory
 
Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6Lecture 10 i pv4 & ipv6
Lecture 10 i pv4 & ipv6
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
Lecture 6 internet services in network
Lecture 6 internet services in networkLecture 6 internet services in network
Lecture 6 internet services in network
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Lecture 3 transmission media
Lecture 3 transmission mediaLecture 3 transmission media
Lecture 3 transmission media
 
Lecture 2 protocol details
Lecture 2 protocol detailsLecture 2 protocol details
Lecture 2 protocol details
 
Lecture 1 networking types roles
Lecture 1 networking types rolesLecture 1 networking types roles
Lecture 1 networking types roles
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Evolution of Computer Viruses and Antivirus Software

  • 1. Information & Communication Technology (ICT) Computer-aided design (CAD) & Computer Aided Manufacturing (CAM) DIT Part 1 Lecture 19 Copyrights By Tanveer Malik
  • 2. Computer Virus • A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. • One of the first detected virus was the Creeper virus in the early 70’s • Before computer networks became widespread, most viruses spread on removable media, particularly floppy disk. Copyrights By Tanveer Malik
  • 3. Computer Virus • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents Copyrights By Tanveer Malik
  • 4. Basic Computer Viruses • Trojan Horses – appears as interesting program file but when installed it allows intruders to access and read your files • Worms – virus that copies and multiplies itself by using computer networks and security flaws • E-mail Viruses – use e-mail messages to spread which allow it to automatically forward itself to thousands of people Copyrights By Tanveer Malik
  • 5. Types of Viruses • Boot Sector Virus – Infects the boot or MBR of diskettes and hard drives through the sharing of infected disks and pirated software applications – Once your hard drive is infected all diskettes that you use in your computer will be infected • Program Virus – Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened – It then makes copies of itself and will infect other programs on the computer • Multipartite Virus – Hybrid of a Boot Sector and Program viruses – It infects program files and when the infected program is active it will affect the boot record Copyrights By Tanveer Malik
  • 6. Types of Viruses • Stealth Virus – Disguises itself to prevent from being detected by antivirus software – It alters its file size or conceals itself in memory • Polymorphic Virus – Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file • Macro Virus – Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel – Once it gets in to your computer, every document you produce will become infected – Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed Copyrights By Tanveer Malik
  • 7. Signs Your Computer is Infected • Functions slower than normal • Responds slowly and freezes often • Restarts itself often • See uncommon error messages, distorted menus, and dialog boxes • Notice applications fail to work correctly • Fail to print correctly Copyrights By Tanveer Malik
  • 8. Total Number of Viruses By Bear January 1985 1 January 1985 1 January 1987 3 January 1989 6 January 1990 142 January 1991 357 January 1992 1,161 January 1993 2,482 January 1994 3,687 January 1995 5,626 January 1996 7,764 January 1997 11,037 January 1998 16,726 January 1999 40,850 January 2000 44,000 January 2001 48,000 January 2002 55,000 January 2003 62,000 Copyrights By Tanveer Malik
  • 9. Melissa • Another virus that fired up the media was Melissa, a Word macro virus. • When people received the host Word document via email and opened it, the virus sent a copy of itself to the first 50 people in the victim's address book. • Named after a topless dancer in Florida, the Melissa virus crashed the email servers of corporations and governments in different spots around the world. • The Computer Emergency Response Team, set up after Robert Morris mucked up the Internet with his worm in 1988, estimated that the virus hit 100,000 computers in its first weekend. • David L. Smith posted the infected file to an alt.sex usenet group using a stolen AOL account. Initially he entered a plea of innocence, but after being confronted with a maximum sentence of 40 years in prison, he eventually pled guilty and received a much-reduced sentence. Copyrights By Tanveer Malik
  • 10. Love You, Love Bug • By almost any measure, the so-called Love Bug was the most damaging and costly virus ever. • We don't know who comes up with these whack figures, but according to Reuters the bug cost the world $15 billion in lost productivity. The Love Bug spread far faster than Melissa. • Unlike Melissa, it would mail itself to everyone in your Outlook address book -- most of whom would probably be delighted to read about how you love them -- not just the first fifty. • Moreover, it would gobble up certain media files stored on your hard drive. Copyrights By Tanveer Malik
  • 11. Did you know • One German newspaper tragically lost 2,000 pictures from its archive. • The perpetrator turned out to be a 23-year-old Filipino computer science student who more or less plagiarized all of his code. • The lack of laws in the Philippines covering computer crimes, he pretty much got away with his crime. Copyrights By Tanveer Malik
  • 12. Prevention • Upload and use antivirus software • Be aware of the e-mails and attachments you open • Check for updates on antivirus software regularly • Make sure antivirus software is installed correctly Copyrights By Tanveer Malik
  • 14. Computer Antivirus • Antivirus or anti-virus software (often abbreviated as AV), sometimes known as anti- malware software, is computer software used to prevent, detect and remove malicious software. • Antivirus software was originally developed to detect and remove computer viruses, hence the name. Copyrights By Tanveer Malik
  • 15. Computer Antivirus • Anti-Virus Software are computer programs that attempt to identify, neutralize or eliminate malicious software. • Most modern antivirus software is now designed to combat a wide range of threats, including worms, rootkits, Trojans, often described collectively as malware. Copyrights By Tanveer Malik
  • 16. APPROACHES TO DETECT VIRUSES 1. THE SIGNATUREAPPROACH: • Just like the police traces patterns in crimes back to a criminal ,software engineers can reverse engineer a virus to find the signature it leaves. • This signature is added to the database so that when buster performs a virus scan, each file is scanned for matches with any virus’ signature Copyrights By Tanveer Malik
  • 17. 2.THE SANDBOX APPROACH: • A ‘sandbox is an advanced program that emulates an OS. • A suspect executable file is run within the confines of a sandbox and then the sandbox is examined to see what changes were made. APPROACHES TO DETECT VIRUSES Copyrights By Tanveer Malik
  • 18. 3.THE HEURISTIC APPROACH: • This analyses a program for ‘seemingly’ malicious behavior ,heuristics is effective against undocumented viruses . • The buster of the future might eliminate the need for continual monitoring of new viruses.. APPROACHES TO DETECT VIRUSES Copyrights By Tanveer Malik
  • 19. Manual Prevention from Viruses • Delete your browsing history, temporary internet files, internet cookies before exiting . • Always remember to scan any removable hardware using anti- virus software before accessing it. Removable hardware includes Floppy Disks, CD, USB Drive. • Scan your computer every week using anti-virus software like Norton, McAfee for prevention against malware • Update your anti-virus for new and latest virus definitions. • Create a system restore point before installing any software or freeware. Copyrights By Tanveer Malik