SlideShare a Scribd company logo
1 of 12
Topics
Virus
Malicious software
Malicious software
Malicious Software (Malware) :
Malicious software, commonly known as malware, is any software that
brings harm to a computer system. Malware can be in the form of worms,
spyware, trojan, adware, viruses and rootkits, etc.
Terminology of malicious software
Virus :
Attaches itself to a program and propagates copies if itself to other
programs .
Worm :
Program that propagates copies of itself to other computers .
Logic bomb :
Triggers actions when action occurs .
Trojan horse :
Program that contains unexpected additional functionality .
Exploits :
Code specific to a single vulnerability or set of vulnerabilities .
Downloaders :
Program that installs other items on a machine that is under attack .
Usually a downloader is sent in an e-mail .
Terminology of malicious software
Auto-rooter :
Malicious hacker tools used to break into new machines remotely .
Flooders :
Used to attack networked computer system with a large volume of traffic
to carry out a denial-of-service (DoS) attack .
Keyloggers :
Captures keystrokes on a compromised system .
Rootkit :
Set of hackers tools used after attacker ha broken into a computer system
and gained root-level access .
Zombie :
Program activated on an infected machine that is activated to launch
attacks on other machines .
Virus
Virus :
Self-replicating code attaches itself to another program and executes
secretly when the host program is executed .
A virus goes through following four phases --
1. Dormant phase
2. Propagation phase
3. Triggering phase
4. Execution phase
Phases of Virus
Classifications of Virus
There are various types of virus --
1. Parasitic virus
2. Memory resident virus
3. Boot sector virus
4. Stealth virus
5. Polymorphic virus
6. Metamorphic virus
Classifications of Virus
Parasitic virus :
It attaches itself to executable code and replicates itself . When the
infected code is executed it will find other executable code or program to
infect .
Memory resident virus :
This types of virus lives in memory after its execution . It inserts itself
as a part of operating system or application and can manipulate any file
that is executed , copied or moved .
Boot sector virus :
This type of virus infects the boot records and spread through a
system when a system is booted from disk containing virus .
Classifications of Virus
Stealth virus :
It is the virus who hide the modification it has made in the file or
boot record .
Polymorphic virus :
It produces fully operational copies of itself , in an attempts to avoid
signature detection .
Metamorphic virus :
Rewrite itself completely with every new host , may change their
behavior and appearance .
Conclusion
So--
It(virus) is harmful to our system and we should always use antivirus
software to protect our system . We can use Linux operating system to
avoid viruses and worms because Linus does not support viruses .
THANK YOU…..

More Related Content

What's hot

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Program security
Program securityProgram security
Program securityG Prachi
 

What's hot (20)

Malicious
MaliciousMalicious
Malicious
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Mitppt
MitpptMitppt
Mitppt
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Computer virus
Computer virusComputer virus
Computer virus
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Malewareanalysis
Malewareanalysis Malewareanalysis
Malewareanalysis
 
Ch19
Ch19Ch19
Ch19
 
Program security
Program securityProgram security
Program security
 

Similar to Malicious Software and Virus

Similar to Malicious Software and Virus (20)

Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Malicious Software and Virus

  • 1.
  • 3. Malicious software Malicious Software (Malware) : Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, spyware, trojan, adware, viruses and rootkits, etc.
  • 4. Terminology of malicious software Virus : Attaches itself to a program and propagates copies if itself to other programs . Worm : Program that propagates copies of itself to other computers . Logic bomb : Triggers actions when action occurs . Trojan horse : Program that contains unexpected additional functionality . Exploits : Code specific to a single vulnerability or set of vulnerabilities . Downloaders : Program that installs other items on a machine that is under attack . Usually a downloader is sent in an e-mail .
  • 5. Terminology of malicious software Auto-rooter : Malicious hacker tools used to break into new machines remotely . Flooders : Used to attack networked computer system with a large volume of traffic to carry out a denial-of-service (DoS) attack . Keyloggers : Captures keystrokes on a compromised system . Rootkit : Set of hackers tools used after attacker ha broken into a computer system and gained root-level access . Zombie : Program activated on an infected machine that is activated to launch attacks on other machines .
  • 6. Virus Virus : Self-replicating code attaches itself to another program and executes secretly when the host program is executed . A virus goes through following four phases -- 1. Dormant phase 2. Propagation phase 3. Triggering phase 4. Execution phase
  • 8. Classifications of Virus There are various types of virus -- 1. Parasitic virus 2. Memory resident virus 3. Boot sector virus 4. Stealth virus 5. Polymorphic virus 6. Metamorphic virus
  • 9. Classifications of Virus Parasitic virus : It attaches itself to executable code and replicates itself . When the infected code is executed it will find other executable code or program to infect . Memory resident virus : This types of virus lives in memory after its execution . It inserts itself as a part of operating system or application and can manipulate any file that is executed , copied or moved . Boot sector virus : This type of virus infects the boot records and spread through a system when a system is booted from disk containing virus .
  • 10. Classifications of Virus Stealth virus : It is the virus who hide the modification it has made in the file or boot record . Polymorphic virus : It produces fully operational copies of itself , in an attempts to avoid signature detection . Metamorphic virus : Rewrite itself completely with every new host , may change their behavior and appearance .
  • 11. Conclusion So-- It(virus) is harmful to our system and we should always use antivirus software to protect our system . We can use Linux operating system to avoid viruses and worms because Linus does not support viruses .