2. CONTENT
⢠Introductionâ
⢠Malware, Worms, Trojans, Adware
⢠Which antivirus can detect spyware?
⢠Ransomware attack solution
⢠Common Signs of Computer Viruses
⢠The negative impact of a computer infection
⢠What is an Anti-Virus?
⢠Functions of an Antivirus Software
Major antivirus software
⢠history of computer viruses
⢠Protecting yourself against the unknown
What Causes Computer Viruses?
⢠Structure of computer virus
⢠How to deal with computer viruses and malware
⢠Conclusion
⢠âReferences
3. INTRODUCTION
A computer virus is a type of malicious software, or
malware, that spreads between computers and causes
damage to data and software. Computer viruses aim to
disrupt systems, cause major operational issues, and
result in data loss and leakage.
Virus 3
4. WHAT IS THE DATA LEAKAGE?
⢠A data breach or data leak is the release of sensitive, confidential or
protected data to an untrusted environment. Data breaches can occur
as a result of a hacker attack.
⢠This is often caused by poor data security and sanitization, outdated
systems, or a lack of employee training. Data leaks could lead to
identity theft, data breaches, or ransomware installation.
Presentation title 4
6. COMPUTER VIRUS
STATISTICS
58% of all known computer malware is known to come
from trojans. 13% of all computer malware infections
are known to come from viruses. 9% of all malware
infections across the globe are known to come from
scripts. 53% of all computer viruses are known to be
spread by the use of .exe files.
7.
8.
9. WHICH ANTIVIRUS
CAN DETECT
SPYWARE?
â˘McAfee â Advanced Anti-Spyware That's Great for
Families. ...
â˘Intego â Excellent Spyware Protection for Mac. ...
â˘Avira â Best Free Spyware Protection. ...
â˘Malwarebytes â Minimalistic Antivirus With Good
Spyware Protection.
â˘MacKeeper â Simple, Fast Spyware Removal (Mac
Only)
10.
11. RANSOMWARE ATTACK
SOLUTION
Use anti-virus and anti-malware software or
other security policies to block known payloads
from launching. Make frequent, comprehensive
backups of all important files and isolate them
from local and open networks.
12. COMMON SIGNS OF COMPUTER VIRUSES
Presentation on Virus 12
1. Unexpected pop-up windows:
Unexpected or unusual dialog boxes and windows can be a bad sign. Fake virus
warnings claim you have security threats on your computer and usually prompt you to
click a link or call a number.
âOne of the things we always tell people is that, as of right now, thereâs no way a
website can tell you if your computer is infected,â Armstrong said. âSometimes, Skype
will pop up a message saying, âUrgent security vulnerability.â But Skype canât tell if
your computer is infected.â
Legitimate protection software, such as Windows Defender and virus-scanning
programs, will never prompt you to call a customer service number.
13. 2. RANDOM SOUNDS
⢠Infected computers are often programmed to respond with an audio signal to things you
canât control.
⢠âTheyâll be things like warning beeps,â Armstrong said. âWhen an error message pops up,
a lot of times, it comes along with a warning message. Certain pieces of malware stifle
that window so you canât see it. But you might still hear the warning message â a sound in
the background that you didnât initiate.â
⢠If you regularly hear chimes and bells from your computer that seem phantom, your
computer may have a virus or malware infection.
Presentation title 13
14. 3. UNEXPLAINED FILE OR FOLDER
CHANGES
⢠Your files might be missing, or the icons and content of your files may be
different. Your computer wonât make these types of changes to your files
unless you have a virus or technical problem, though corrupted browser
bookmarks shouldnât be regarded as a warning sign. Itâs common for
bookmark icons to become jumbled by a browser such as Chrome.
Presentation title 14
15. 4. SLOW OPERATION
⢠Pay attention to whether your computer is running more slowly than usual, especially if its
hard drive light (if it has one) is constantly on or its fan is operating at full speed. This
suggests the computerâs resources are being redirected away from legitimate programs.
⢠âOne of the popular scams right now is something called âpay per install,'â Armstrong said.
âThere are third-party companies out there in places like Russia and China that allow
[someone] to go to their forums and sign up to receive a piece of software. They then pay
[that person] for every thousand users they can fool into installing the software.â
Presentation title 15
16. Money is a massive incentive for
cybercriminals. âSo, these people who try to
trick you into installing rogue software will
put as many things on your computer as
possible at the same time to make the most
money,â Armstrong added. âAnd with all this
spyware and applications running at the
same time, youâll see a slowdown in
performance.â
17. 5. RANDOM CONNECTIONS TO UNKNOWN
WEBSITES
⢠Another sign of an infection is when your legitimate antivirus software alerts you that an
application is trying to connect to a website youâve never heard of.
⢠In general, your computer doesnât make its own connections; someone has to initiate
them. If you didnât initiate these connections, problematic software could be doing it for
you.
Presentation title 17
18. 6. UNEXPECTED
IMAGES
You might see pornographic images pop up or replace
benign images, such as photos on news sites. A related
sign that your computer is infected is the constant
appearance of pop-up ads for sites you donât usually visit.
Presentation title 18
19. 7. INABILITY TO DOWNLOAD ANTIVIRUS
PROGRAMS OR UPDATES
⢠Computer viruses arenât living things, but some are programmed with a self-
preservation instinct. For the average computer user, the best way to kill a
virus is via an antivirus scan. If youâre having trouble downloading and
installing the antivirus software, or youâre unable to update your existing
program, the virus may be defending itself. Some antivirus software
solutions provide rescue disks to scan and clean an infected PC.
Presentation title 19
20. 8. SPAM SENT FROM
YOUR EMAIL ADDRESS
OR SOCIAL MEDIA
Malware can work in many different ways. One variant
sends random messages to your contacts list. This
infection spreads across the internet by tricking people
into clicking on an infected link. The link then spreads
the malware to that person, who unwittingly spreads it
throughout their friend list. By logging out of your
accounts, creating strong passwords and implementing
security measures like two-factor authentication, you can
thwart any further intrusion.
21. 9. SUDDEN LACK OF HARD DRIVE
SPACE
⢠Have you suddenly run out of space on your hard drive? Self-replicating
viruses or worms (often called âdisk bombsâ) can wreak havoc on a
computer system by rapidly filling hard drives with copies of itself. In many
cases, the files it injects into a hard drive are invisible under default file-
browsing settings.
Presentation title 21
22. 10. STRANGE RUNNING PROCESSES
⢠If your computer is acting strangely or not running as smoothly as youâd
expect, type âTask Managerâ into the search bar of Windows. This will list
all processes consuming system resources, including rogue processes
running in the background.
⢠If an unfamiliar piece of software is consuming a disproportionate share of
system resources (specifically CPU, memory and disk space), there may
be a problem.
Presentation title 22
23. Presentation title 23
THE NEGATIVE IMPACT OF A
COMPUTER INFECTION
⢠A virus or malware will negatively impact your system,
leaving you vulnerable to fraud, but the degree of
impact depends on the infectionâs type and scope.
⢠Here are some of the possible consequences of a
computer infection:
⢠Loss of performance: Malware can make your
computer process things more slowly, hogging system
resources and taking far longer than usual to get work
done.
⢠Loss of bandwidth: Botnets are networks of
computers serving a central remote system, often
distributing large volumes of data and consuming all
broadband bandwidth.
24. Presentation title 24
⢠Loss of function: In extreme cases, the virus can degrade
your computer performance or programming so severely that
you can no longer use your machine.
⢠Exposure to other dangerous software: The purpose of
some malware is to entice you to download even more
dangerous software.
⢠Loss of information: Viruses might delete stored files or data,
while ransomware may destroy your entire hard drive if specific
demands arenât met.
25. Presentation title 25
⢠Breach of privacy: Viruses sometimes seek to gather
information for identity theft or fraud. This could result in
financial losses if your accounts are breached and even
punitive fines if your firm didnât follow local and state
business regulations surrounding data privacy.
26. WHAT IS AN ANTI-VIRUS?
Presentation title 26
⢠An anti-virus is a software which comprises programs or set of programs
which can detect and remove all the harmful and malicious software from
your device. This anti-virus software is designed in a manner that they can
search through the files in a computer and determine the files which are
heavy or mildly infected by a virus.
27. FUNCTIONS OF AN
ANTIVIRUS SOFTWARE
â˘Scans the specific files and directories for
malware patterns which can indicate any malware.
â˘Allows the users to schedule scans according to
them.
â˘Users can also scan the system anytime they
want.
â˘If it detects any malicious software it removes it
from the system.
27
Presentation title
28. MAJOR ANTIVIRUS SOFTWARE
Norton Antivirus:
Security software protects your computers, tablets and smartphones
from getting malware and viruses. Norton 360 plans include both
VPN & Security, plus additional features to help protect your devices
and your online privacy.
Presentation title 28
29. F-SECURE ANTIVIRUS
Internet Security protects you against viruses,
ransomware, spyware, infected email
attachments and other malware. Top-rated for
protection and performance, the app ensures
that your devices stay clean and fast â whether
you are using a PC, Mac, Android or iOS device.
30. KASPERSKY
ANTIVIRUS
Kaspersky's antivirus software does its job well: it keeps
you safe from malware and shows excellent results in
external tests. On top of that, it offers countless
additional security and privacy features that users can
benefit from, like an ad blocker, VPN, anti-fraud features,
and performance optimization options.
31. AVAST ANTIVIRUS
⢠Our Verdict. Avast has a great reputation for protecting
computers from viruses and malware. With free and premium
options, it delivers a complete security solution. Avast offers a
wide range of tools beyond basic antivirus protection, including
password protection, data shredder, webcam shield, sandbox
and more.
Presentation title 31
32. COMODO ANTIVIRUS
Comodo Antivirus isn't unsafe in
itself, but it can't fully protect you
from malware or other online
threats. Comodo's software will
provide you with more protection
than if you have no antivirus
software at all.
The VPN feature lets you securely
and anonymously connect to the
internet through an encrypted
proxy hosted by Comodo
32
33. MCAFEE ANTIVIRUS
MacAfee is an excellent choice
if you are looking for antivirus
software with real-time malware
detection for all your devices at
an affordable price.
MacAfee does and doesn't slow
down your computer.
MacAfeeÂŽ total protection
includes identity protection and
a VPN to protect your personal
info. Rest assured that with our
free 30-day trial you'll get all the
features of our flagship product,
including antivirus, web
protection, password manager,
and more.
33
34. A SHORT HISTORY OF COMPUTER
VIRUSES
âRichard The first computer virus,
called "Creeper system", was an
experimental self-replicating virus
released in 1971. It was filling up the
hard drive until a computer could not
operate any further. This virus was
created by BBN technologies in the
US.
â
34
35. The first computer virus for
MS-DOS was "Brain" and
was released in 1986. It
would overwrite the boot
sector on the floppy disk and
prevent the computer from
booting. It was written by two
brothers from Pakistan and
was originally designed as a
copy protection.
36. WHO DEVELOPED THE
C BRAIN?
Brain was written by Amjad Farooq Alvi
and Basit Farooq Alvi, who at the time
lived in Chah Miran, near Lahore Railway
Station, in Lahore, Pakistan. The brothers
told Time magazine they had written it to
protect their medical software from illegal
copying, and it was supposed to target
copyright infringement only.
36
37. "The Morris" was the first computer virus which
spread extensively in the wild in 1988. It was
written by Robert Morris, a graduate student
from Cornell university who wanted to use it to
determine the size of the internet. His approach
used security holes in send mail and other Unix
applications as well as weak passwords
37
MORRIS WORM
38. but due to a programming mistake it spread too fast and
started to interfere with the normal operation of the
computers. It infected around 15,000 computers in 15 hours,
which back then was most of the internet.
Robert Tappan Morris (born November 8, 1965) is an
American computer scientist and entrepreneur. He is
best known for creating the Morris worm in 1988,
considered the first computer worm on the Internet.
Presentation on virus 38
39. A systems administrator known for
discovering and subsequently tracking the
hacker Markus Hess three years earlier,
helped fight the worm, writing in 1989 that
"I surveyed the network, and found that
two thousand computers were infected
within fifteen hours. These machines were
dead in the waterâuseless until
disinfected. And removing the virus often
took two days."
39
40. PROTECTING YOURSELF AGAINST THE
UNKNOWN
Presentation of Virus 40
⢠Do not open emails and email attachments, when you are not 100%
certain that they are legitimate.
⢠Do not click on links in emails or their attachments unless you were
expecting to receive them. Remember, email accounts can be
spoofed or hacked, so although a message may appear to come
from a legitimate source, if the content is not what you expect from
that sender it may not be trustworthy.
41. â˘Keep your computer up to date with the
latest software updates and security
patches.
â˘Check for spelling or grammar mistakes
- this includes in the URL of websites
you visit as well as the body of emails.
For example, mistaking ofice.com for
Microsoft's office.com will take you to a
known malware site.
41
Presentation on Virus
42. WHAT CAUSES COMPUTER VIRUSES?
42
⢠Computer viruses are standard programs;
instead of offering useful resources, these
programs can damage your device. Computer
viruses are typically crafted by hackers with
various intentions, like stealing sensitive data
to causing chaos in systems.
43. Some hackers create these malicious programs
for fun or as a challenge, while others have
more sinister motives like financial gain or cyber
warfare.
The delivery of a computer virus can happen in
several ways. One common method is via
a phishing email. Another technique is hosting
malware on a server that promises to provide a
legitimate program. It can be delivered using
macros or by injecting malicious code into
legitimate software files.
43
44. 5 Common Ways of Getting a Computer
Virus
â˘Opening Links in Emails from Unknown Senders. This
is probably the most effective way of disseminating
malware.
â˘Downloading Malware from Untrustworthy Sites.
â˘Clicking Online Ads.
â˘Social Media Scams.
â˘Software that Hasn't Been Patched Properly.
45. STRUCTURE OF
COMPUTER VIRUS
A computer virus generally contains three
parts: the infection mechanism, which finds
and infects new files, the payload, which is the
malicious code to execute, and the trigger,
which determines when to activate the
payload. Also called the infection vector, this is
how the virus spreads.
46. INFECTION MECHANISM
⢠This mechanism includes how a virus propagates and
enables it to replicate. It has two sub-components:
⢠Search: It is used to search for the host program.
⢠Copy: It is used by the virus to copy itself into the
executable program.
Presentation title 46
47. TRIGGER
⢠The event or condition determines when the payload is activated.
47
PAYLOAD
⢠It performs the functions for which the virus was designed. It may involve
harmful or benign activities.
51. AVOID UNFAMILIAR
URLS.
Compromised websites are often loaded with malware,
and some top-level domains (the final part of any
websiteâs address, or URL) are synonymous with
malware. Threat intelligence experts
at Spamhaus reported in June 2022 that a website
bearing the .ci TLD (top-level domain) is over 86% more
likely to be associated with spam in some way. .ci is the
country code TLD for Ivory Coast.
Other widely abused TLDs include .mw, .surf, .cn and
.top. If youâre âinvitedâ to visit a website at any of these
domains, especially through an unsolicited message,
approach them with great caution; they are likely
malware and spyware repositories.
51
52. MAINTAIN YOUR INSTALLED
PROGRAMS.
⢠One of the primary ways viruses gain access to a system is through
security lapses in existing software. A first step to prevent your computer
from getting infected is to ensure your applications, antivirus software and
operating system are up to date.
⢠This is doubly important for your operating system since Apple, Microsoft
and other providers regularly release security patches to deal with potential
cybersecurity weaknesses. You can also reduce potential vulnerabilities for
cybercriminals to exploit by uninstalling applications you donât use.
Presentation title 52
53. INSTALL ONLY ONE ANTIVIRUS
SOLUTION.
⢠It may seem wise to have multiple layers of antivirus protection to secure your devices
from hackers, but the law of diminishing returns applies. If you have more than one
antivirus software program installed on your machine, you run the risk of having them
cancel each other out because each thinks the other is a virus. This can result in limited
antivirus protection at best or file corruption at worst.
⢠Note that the integrated Windows Defender utility preloaded onto PCs is designed to run
alongside third-party software from firms like McAfee, Kaspersky and AVG.
Presentation title 53
54. AUTOMATE VIRUS
SCANS
You donât always have to be next to your computer when it
conducts a virus scan. Most modern antivirus software has
automation features that let you set a specific time for the
computer to run a scan. By setting the process for a time
when you donât need to use the computer â like when
youâre sleeping â you can ensure your system is safe
without hindering your productivity.
Presentation title 54
55. POP THOSE POP-
UPS.
If youâre dealing with rogue pop-ups on your
computer, stop the process running the pop-up.
â˘Windows PC: Launch the Task Manager, locate the
process you suspect is running the pop-up and stop
the pop-up.
â˘Mac: Select the Apple Menu and choose âForce
Quit.â Locate the process you suspect is running the
pop-up and click âForce Quit.â
This doesnât remove the infection. Your next step
should be installing and running an antivirus solution
to find and remove the problem.
56. RESTART YOUR
COMPUTER IN SAFE
MODE.
Starting your computer in safe mode gives you a chance
to run your antivirus software and take a closer look at
the issue. Begin by rebooting the computer.
â˘Windows: On a Windows PC, press and hold F8 as
soon as the reboot begins, and then choose Safe Mode
from the menu that appears.
57. â˘Mac: On a Mac, hold down the
Shift key while rebooting, and then
perform an antivirus scan to
eliminate any other potential
infections
58. BOOT FROM A RESCUE CD.
⢠Some malware can destroy antivirus software. When that happens, you may be able to
create a Linux-based rescue CD to reboot your computer and disinfect or repair corrupted
files. Most major antivirus software makers offer these files for free, but youâll need access
to another PC with a broadband connection and a CD burner. Without a disk drive, this
option wonât work for you.
Presentation title 58
59. CONCLUSION
Regardless of type, malware can cause
significant problems for any machine in any
business. If you can identify what youâre dealing
with, you may be able to take specific steps to
foil the program. Consult your antivirus software,
IT expert or online tech support service to learn
the best way to handle your systemâs infection.
60. REFERENCES
Presentation on Virus 60
https://www.businessnewsdaily.com/
https://en.wikipedia.org/
https://www.malwarebytes.com/
https://www.avast.com/