SlideShare a Scribd company logo
1 of 15
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
A computer virus is a caustic computer
program that can replicate itself and spread from
one computer to another without the permission of
the owner.




       © 2012 Charmaine S. Camilo. All rights
                   reserved.
Viruses




  Botnet                   Malware       Worms




                             Trojan
                             Horse

© 2012 Charmaine S. Camilo. All rights
            reserved.
•   Worms
•   Boot sector virus
•   File infection virus
•   Multipartite virus
•   Network virus
•   E-mail virus
•   Macro virus
•   Memory resident viruses
•   Root kit virus
•   Polymorphic viruses
•   Logic bombs/Time bombs


         © 2012 Charmaine S. Camilo. All rights
                     reserved.
The following are some possible indications
    that a computer has been infected by a virus.
    These problems can also be caused by non-virus
    problems, but they are the most reported
    symptoms of a computer virus infection.

•   Computer no longer boots up.
•   Screens sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.

         © 2012 Charmaine S. Camilo. All rights
                     reserved.
Virus writers have to balance how and when
  their viruses infect against the possibility of being
  detected. Therefore, the spread of an infection
  may not be immediate.

Phases of Viruses
• Infection phase
• Attack phase




        © 2012 Charmaine S. Camilo. All rights
                    reserved.
•   System Sectors/Boot Records
•   Files
•   Companion Files
•   Macros
•   Disk Clusters
•   Batch Files
•   Source Code
•   Visual Basic Worms




         © 2012 Charmaine S. Camilo. All rights
                     reserved.
1. Email attachments.
2. Rogue Websites.
3. Networks
4. Infected Boot Disks
5. Phishing Schemes
6. Infected Software
7. Hackers
8. Instant Messaging
9. Fake Anti Virus Software
10. From Mobile Devices
11. Friends and Relatives

        © 2012 Charmaine S. Camilo. All rights
                    reserved.
• Anti-virus software
• Scan your computer on a regular basis
• Update your anti-virus software on a regular basis
• Back-up
• Turn-off E-mail Preview
• Scan Removable disk
• Scan downloaded files
• Scan all e-mail attachments
• Beware of e-mail attachments from unknown
  sources
• Be alert!


        © 2012 Charmaine S. Camilo. All rights
                    reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.

More Related Content

What's hot

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
ariifuddin
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 

What's hot (20)

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Adware
AdwareAdware
Adware
 
Internet threat
Internet threatInternet threat
Internet threat
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Sowmya
SowmyaSowmya
Sowmya
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 

Viewers also liked

Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Arvin Garing
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
leahamper29
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of Rights
Kostyk Elf
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga Filipina
RUEL VILLASIS
 

Viewers also liked (20)

Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)
 
Chapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksChapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and Works
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
 
RIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADRIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROAD
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
 
Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987
 
Article 2 Philippine Constitution
Article 2 Philippine ConstitutionArticle 2 Philippine Constitution
Article 2 Philippine Constitution
 
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of Rights
 
Introduction to WAN
Introduction to WANIntroduction to WAN
Introduction to WAN
 
Kabanata 25 rizal
Kabanata 25 rizalKabanata 25 rizal
Kabanata 25 rizal
 
Chapter 21-jpr
Chapter 21-jprChapter 21-jpr
Chapter 21-jpr
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga Filipina
 
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanJose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
 
Rizal's Life in Dapitan
Rizal's Life in DapitanRizal's Life in Dapitan
Rizal's Life in Dapitan
 
Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan
 
Socio5 13 la liga and exile in dapitan
Socio5   13 la liga and exile in dapitanSocio5   13 la liga and exile in dapitan
Socio5 13 la liga and exile in dapitan
 

Similar to Computer Virus

Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
BbAOC
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 

Similar to Computer Virus (20)

NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxCYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptx
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

More from Charmaine Camilo

Barriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic CultureBarriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic Culture
Charmaine Camilo
 
Socioanthro report cellona
Socioanthro report cellonaSocioanthro report cellona
Socioanthro report cellona
Charmaine Camilo
 
Growth of A Democratic Culture
Growth of A Democratic CultureGrowth of A Democratic Culture
Growth of A Democratic Culture
Charmaine Camilo
 
Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)
Charmaine Camilo
 

More from Charmaine Camilo (16)

GMO - Genetically Modified Organisms
GMO - Genetically Modified OrganismsGMO - Genetically Modified Organisms
GMO - Genetically Modified Organisms
 
Prehistoric Weapons
Prehistoric WeaponsPrehistoric Weapons
Prehistoric Weapons
 
This I Promise You - NSYNC
This I Promise You - NSYNCThis I Promise You - NSYNC
This I Promise You - NSYNC
 
All About Ears
All About EarsAll About Ears
All About Ears
 
Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)
 
Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)
 
Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)
 
Barriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic CultureBarriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic Culture
 
Recommendations
RecommendationsRecommendations
Recommendations
 
Socioanthro report cellona
Socioanthro report cellonaSocioanthro report cellona
Socioanthro report cellona
 
Bridges
BridgesBridges
Bridges
 
Growth of A Democratic Culture
Growth of A Democratic CultureGrowth of A Democratic Culture
Growth of A Democratic Culture
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Computer Virus

  • 1. © 2012 Charmaine S. Camilo. All rights reserved.
  • 2. © 2012 Charmaine S. Camilo. All rights reserved.
  • 3. © 2012 Charmaine S. Camilo. All rights reserved.
  • 4. © 2012 Charmaine S. Camilo. All rights reserved.
  • 5. © 2012 Charmaine S. Camilo. All rights reserved.
  • 6. A computer virus is a caustic computer program that can replicate itself and spread from one computer to another without the permission of the owner. © 2012 Charmaine S. Camilo. All rights reserved.
  • 7. Viruses Botnet Malware Worms Trojan Horse © 2012 Charmaine S. Camilo. All rights reserved.
  • 8. Worms • Boot sector virus • File infection virus • Multipartite virus • Network virus • E-mail virus • Macro virus • Memory resident viruses • Root kit virus • Polymorphic viruses • Logic bombs/Time bombs © 2012 Charmaine S. Camilo. All rights reserved.
  • 9. The following are some possible indications that a computer has been infected by a virus. These problems can also be caused by non-virus problems, but they are the most reported symptoms of a computer virus infection. • Computer no longer boots up. • Screens sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. © 2012 Charmaine S. Camilo. All rights reserved.
  • 10. Virus writers have to balance how and when their viruses infect against the possibility of being detected. Therefore, the spread of an infection may not be immediate. Phases of Viruses • Infection phase • Attack phase © 2012 Charmaine S. Camilo. All rights reserved.
  • 11. System Sectors/Boot Records • Files • Companion Files • Macros • Disk Clusters • Batch Files • Source Code • Visual Basic Worms © 2012 Charmaine S. Camilo. All rights reserved.
  • 12. 1. Email attachments. 2. Rogue Websites. 3. Networks 4. Infected Boot Disks 5. Phishing Schemes 6. Infected Software 7. Hackers 8. Instant Messaging 9. Fake Anti Virus Software 10. From Mobile Devices 11. Friends and Relatives © 2012 Charmaine S. Camilo. All rights reserved.
  • 13. • Anti-virus software • Scan your computer on a regular basis • Update your anti-virus software on a regular basis • Back-up • Turn-off E-mail Preview • Scan Removable disk • Scan downloaded files • Scan all e-mail attachments • Beware of e-mail attachments from unknown sources • Be alert! © 2012 Charmaine S. Camilo. All rights reserved.
  • 14. © 2012 Charmaine S. Camilo. All rights reserved.
  • 15. © 2012 Charmaine S. Camilo. All rights reserved.