SlideShare a Scribd company logo
1 of 18
HOW ANTIVIRUS
WORKS
• Viruses can also replicate themselves.
• All computer viruses are manmade.
• A simple virus is dangerous because it will quickly
use all available memory and bring the system
down.
• Virus can damage: files, can format hard drives,
and can also scramble partition tables, etc.
VIRUS
• Computer viruses are small software programs designed to transfer
from one computer to another.
• “A virus is simply a computer program that is intentionally written
to attach itself to other programs and replicate whenever those
programs are executed ”.
• Viruses can easily spread by e-mail attachment or instant messaging
messages.
• Virus can be spread by downloading unnecessary files from Internet.
• Viruses can be disguised as attachments of funny images, greeting
cards, or audio and video files.
HISTORY
• The creeper virus was first detected on ARPANET, in early 1970s
• Propagated from TENEX operating system.( modem are dialed and
connected to remote computers and infect them )
• The first pc virus was a boot sector virus called “brain”, created by Basit
and Amjad Farooq Alvi, in 1986, Lahore, Pakistan.
• This virus copies itself from the software.
TRADITIONAL COMPUTER VIRUSES
• First widely seen in the late 1980s,
• Technology development encouraged virus creation.
• Development of personal computers.
• Due to the internet.
• Development of floppy disks.
HOW VIRUS WORKS?
• When we run infected program it loads into the memory and stars
running as well. It also has an ability to infect other programs.
• When virus runs unidentified programs it adds itself to it.
• When we transfer some programs and files to our friend either through
email, cd, and floppy disk, our friend’s computer can also be affected as
well.
TYPE
• Trojan horses –
A Trojan horse is a simple computer program. The program
damage when we run it. It can even damage hard disk. Trojan horses
can’t replicate automatically.
• E-mail viruses –
An e-mail virus travels as an attachment to email-message and
replicates itself by automatically mailing itself to the entire contact list
on our email address book. Some e-mail viruses don't even require a
double- click. If we hit once, it directly passes to system.
TYPE CONT..
• Worms –
A worm is a small piece of software that uses computer networks
and security holes to replicate itself. A copy of the worm scans the
network for another machine that has a specific security hole. It copies
itself to the new machine using the security hole, and then starts
replicating from there, as well.
• Cross-site scripting viruses are among the new virus. They use cross-site
scripting for propagation. Myspace and Yahoo are most affected sites due
this virus.
SAFETY MEASURES FOR VIRUSES
• Run a secure operating system like UNIX.
• Buy virus protection software and install in PCs.
• Avoid program from unknown sources (INTERNET).
• Use commercial software.
• For Microsoft application, Macro Virus Protection should be
enabled.
• Never download unknown email attachment.
• Block receiving and sending executable codes.
• Solution is Antivirus software
ANTIVIRUS-SOFTWARE
• Softwares that attempt to identify and eliminate computer viruses and
other malicious software (malware).
• Sophisticated - But virus creators are always one step ahead.
• Detection - This is the key to antivirus software.
DETECTION TECHNIQUES
• Scanning
• Integrity Checking
• Interception/ Heuristic Detection
• Scanning is the most commonly used technique in antivirus software.
SCANNING
• Also known as Virus Dictionary Approach.
• Scanner scans the hard disk, memory, boot sector for code snippets.
• If code snippet in a file matches any virus in the dictionary, appropriate
action is taken.
SCANNING
• Advantages
- Viruses can be found before execution.
- False alarms are rare.
- Quick at detecting known viruses.
• Disadvantages
- Polymorphic Viruses.
- Virus executes at least once.
- Continuous updates necessary.
INTEGRITY CHECKER
• Keeps track of threats by monitoring changes to files.
• Maintains information about important files on disk, usually by
calculating checksums
• If a file changes due to virus activity, its checksum will change.
• E.g. Norman Virus Control.
INTEGRITY CHECKER
• Advantages
- Constants updates are not necessary.
- Can be used to detect new viruses.
- Can also detect other damages to data e.g. corruption.
• Disadvantages
- False Positives.
- Cant’ differentiate between corrupted and infected data.
HEURISTIC VIRUS CHECKING
• Generic mechanism for virus detection.
• Rule based.
• Rules differentiate a virus from a non virus.
• If a code snippet follows the defined rules, it is marked as a virus.
• E.g. F-secure antivirus software.
HEURISTIC VIRUS CHECKING
• Advantages
- No need to download updated list of viruses weekly.
- Can be used to detect new viruses.
• Disadvantages
- False Positives.
- Virus creators can write viruses that do not follow the
rules.
THANK YOU
•Team Members
1. Chinmay Kelkar
2. Siddhant Pockle
3. Swapnil Joshi
4. Gautam naik

More Related Content

What's hot

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 

What's hot (20)

Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Virusppt
ViruspptVirusppt
Virusppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Antivirus
AntivirusAntivirus
Antivirus
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 

Viewers also liked

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
انتخاب رشته تحصیلی مناسب
انتخاب رشته تحصیلی مناسبانتخاب رشته تحصیلی مناسب
انتخاب رشته تحصیلی مناسبمشاور کودک
 
Конспект уроку "Як пов'язані довкілля і здоров я людини"
Конспект уроку "Як пов'язані довкілля і здоров я людини"Конспект уроку "Як пов'язані довкілля і здоров я людини"
Конспект уроку "Як пов'язані довкілля і здоров я людини"dtamara123
 
کودک ترسو – ترسها ی طبیعی کودک چیست؟
کودک ترسو – ترسها ی طبیعی کودک چیست؟کودک ترسو – ترسها ی طبیعی کودک چیست؟
کودک ترسو – ترسها ی طبیعی کودک چیست؟مشاور کودک
 
رفتارهای درست با کودکان بیش فعال
رفتارهای درست با کودکان بیش فعالرفتارهای درست با کودکان بیش فعال
رفتارهای درست با کودکان بیش فعالمشاور کودک
 
خلاقیت در نقاشی کودک
خلاقیت در نقاشی کودکخلاقیت در نقاشی کودک
خلاقیت در نقاشی کودکمشاور کودک
 
10 клас зарубіжна література і семестр 2 год.
10 клас зарубіжна література і семестр 2 год.10 клас зарубіжна література і семестр 2 год.
10 клас зарубіжна література і семестр 2 год.dtamara123
 
Examen Nombramiento 2008
Examen Nombramiento 2008Examen Nombramiento 2008
Examen Nombramiento 2008figueroamate
 

Viewers also liked (14)

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
new
newnew
new
 
انتخاب رشته تحصیلی مناسب
انتخاب رشته تحصیلی مناسبانتخاب رشته تحصیلی مناسب
انتخاب رشته تحصیلی مناسب
 
Конспект уроку "Як пов'язані довкілля і здоров я людини"
Конспект уроку "Як пов'язані довкілля і здоров я людини"Конспект уроку "Як пов'язані довкілля і здоров я людини"
Конспект уроку "Як пов'язані довкілля і здоров я людини"
 
کودک ترسو – ترسها ی طبیعی کودک چیست؟
کودک ترسو – ترسها ی طبیعی کودک چیست؟کودک ترسو – ترسها ی طبیعی کودک چیست؟
کودک ترسو – ترسها ی طبیعی کودک چیست؟
 
Mohammed R copy
Mohammed R copyMohammed R copy
Mohammed R copy
 
Movimiento de liberacion zapatista
Movimiento de liberacion zapatistaMovimiento de liberacion zapatista
Movimiento de liberacion zapatista
 
Act 8. tallerpractico10 hugo
Act 8. tallerpractico10 hugoAct 8. tallerpractico10 hugo
Act 8. tallerpractico10 hugo
 
رفتارهای درست با کودکان بیش فعال
رفتارهای درست با کودکان بیش فعالرفتارهای درست با کودکان بیش فعال
رفتارهای درست با کودکان بیش فعال
 
MtS+ COMPANY PROFILE
MtS+ COMPANY PROFILEMtS+ COMPANY PROFILE
MtS+ COMPANY PROFILE
 
خلاقیت در نقاشی کودک
خلاقیت در نقاشی کودکخلاقیت در نقاشی کودک
خلاقیت در نقاشی کودک
 
10 diseno de_diapositivas
10 diseno de_diapositivas10 diseno de_diapositivas
10 diseno de_diapositivas
 
10 клас зарубіжна література і семестр 2 год.
10 клас зарубіжна література і семестр 2 год.10 клас зарубіжна література і семестр 2 год.
10 клас зарубіжна література і семестр 2 год.
 
Examen Nombramiento 2008
Examen Nombramiento 2008Examen Nombramiento 2008
Examen Nombramiento 2008
 

Similar to How do antivirus works

computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 

Similar to How do antivirus works (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
information about virus
information about virusinformation about virus
information about virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Pc viruses
Pc virusesPc viruses
Pc viruses
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malicious
MaliciousMalicious
Malicious
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

How do antivirus works

  • 2. • Viruses can also replicate themselves. • All computer viruses are manmade. • A simple virus is dangerous because it will quickly use all available memory and bring the system down. • Virus can damage: files, can format hard drives, and can also scramble partition tables, etc.
  • 3. VIRUS • Computer viruses are small software programs designed to transfer from one computer to another. • “A virus is simply a computer program that is intentionally written to attach itself to other programs and replicate whenever those programs are executed ”. • Viruses can easily spread by e-mail attachment or instant messaging messages. • Virus can be spread by downloading unnecessary files from Internet. • Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
  • 4. HISTORY • The creeper virus was first detected on ARPANET, in early 1970s • Propagated from TENEX operating system.( modem are dialed and connected to remote computers and infect them ) • The first pc virus was a boot sector virus called “brain”, created by Basit and Amjad Farooq Alvi, in 1986, Lahore, Pakistan. • This virus copies itself from the software.
  • 5. TRADITIONAL COMPUTER VIRUSES • First widely seen in the late 1980s, • Technology development encouraged virus creation. • Development of personal computers. • Due to the internet. • Development of floppy disks.
  • 6. HOW VIRUS WORKS? • When we run infected program it loads into the memory and stars running as well. It also has an ability to infect other programs. • When virus runs unidentified programs it adds itself to it. • When we transfer some programs and files to our friend either through email, cd, and floppy disk, our friend’s computer can also be affected as well.
  • 7. TYPE • Trojan horses – A Trojan horse is a simple computer program. The program damage when we run it. It can even damage hard disk. Trojan horses can’t replicate automatically. • E-mail viruses – An e-mail virus travels as an attachment to email-message and replicates itself by automatically mailing itself to the entire contact list on our email address book. Some e-mail viruses don't even require a double- click. If we hit once, it directly passes to system.
  • 8. TYPE CONT.. • Worms – A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. • Cross-site scripting viruses are among the new virus. They use cross-site scripting for propagation. Myspace and Yahoo are most affected sites due this virus.
  • 9. SAFETY MEASURES FOR VIRUSES • Run a secure operating system like UNIX. • Buy virus protection software and install in PCs. • Avoid program from unknown sources (INTERNET). • Use commercial software. • For Microsoft application, Macro Virus Protection should be enabled. • Never download unknown email attachment. • Block receiving and sending executable codes. • Solution is Antivirus software
  • 10. ANTIVIRUS-SOFTWARE • Softwares that attempt to identify and eliminate computer viruses and other malicious software (malware). • Sophisticated - But virus creators are always one step ahead. • Detection - This is the key to antivirus software.
  • 11. DETECTION TECHNIQUES • Scanning • Integrity Checking • Interception/ Heuristic Detection • Scanning is the most commonly used technique in antivirus software.
  • 12. SCANNING • Also known as Virus Dictionary Approach. • Scanner scans the hard disk, memory, boot sector for code snippets. • If code snippet in a file matches any virus in the dictionary, appropriate action is taken.
  • 13. SCANNING • Advantages - Viruses can be found before execution. - False alarms are rare. - Quick at detecting known viruses. • Disadvantages - Polymorphic Viruses. - Virus executes at least once. - Continuous updates necessary.
  • 14. INTEGRITY CHECKER • Keeps track of threats by monitoring changes to files. • Maintains information about important files on disk, usually by calculating checksums • If a file changes due to virus activity, its checksum will change. • E.g. Norman Virus Control.
  • 15. INTEGRITY CHECKER • Advantages - Constants updates are not necessary. - Can be used to detect new viruses. - Can also detect other damages to data e.g. corruption. • Disadvantages - False Positives. - Cant’ differentiate between corrupted and infected data.
  • 16. HEURISTIC VIRUS CHECKING • Generic mechanism for virus detection. • Rule based. • Rules differentiate a virus from a non virus. • If a code snippet follows the defined rules, it is marked as a virus. • E.g. F-secure antivirus software.
  • 17. HEURISTIC VIRUS CHECKING • Advantages - No need to download updated list of viruses weekly. - Can be used to detect new viruses. • Disadvantages - False Positives. - Virus creators can write viruses that do not follow the rules.
  • 18. THANK YOU •Team Members 1. Chinmay Kelkar 2. Siddhant Pockle 3. Swapnil Joshi 4. Gautam naik