SlideShare a Scribd company logo
1 of 16
Overview
Meaning
History
How do we get viruses ?
Effects of computer viruses
Types of computer infections
Keeping computer virus free
Anti-viruses
Some facts
Conclusion
Meaning
• A computer virus is a program or piece of code that is loaded onto
your computer without your knowledge and runs against your
wishes. Viruses can also replicate themselves. All computer viruses
are man-made. A simple virus that can make a copy of itself over
and over again is relatively easy to produce. Even such a simple
virus is dangerous because it will quickly use all available memory
and bring the system to a halt. An even more dangerous type of
virus is one capable of transmitting itself across networks and
bypassing security systems.
History…
• The Creeper virus was first detected on ARPANET, the forerunner
of the Internet, in the early 1970s.
• Creeper was an experimental self-replicating program written by
Bob Thomas at BBN Technologies in 1971.
• Creeper used the ARPANET to infect DEC PDP-10 computers
running the TENEX operating system.
• Creeper gained access via the ARPANET and copied itself to the
remote system where the message, "I'm the creeper, catch me if
you can!" was displayed. The Reaper program was created to
delete Creeper.
How Do We Get Viruses ?






Sharing music, files or photos with other users
Visiting an infected Web site
Opening spam email or an email attachment
Downloading free games, toolbars, media players and other
system utilities
Installing mainstream software applications without fully
reading license agreements
Effects of Viruses
Slow computer performance
Erratic computer behavior
Unexplained data loss
Frequent computer crashes
Sapping computer memory
 Files/Directories disappear
 Denial of service
Types of Computer Infection

Viruses
Meaning….
Trojans

Viruses

Worms

Those on the receiving end
of a Trojan Horse are
usually tricked into opening
them because they appear
to be receiving legitimate
software or files from a
legitimate source.

Like a human virus, a
computer virus can range in
severity: some may cause
only mildly annoying effects
while others can damage
your hardware, software or
files

Worms spread from
computer to computer, but
unlike a virus, it has the
capability to travel without
any human action
Keeping Computer Virus Free
• Install anti-virus software from a reputable vendor. Update it and use it
regularly.
• In addition to scanning for viruses on a regular basis, install an "on
access" scanner (included in most anti-virus software packages) and
configure it to start each time you start up your computer. This will
protect your system by checking for viruses each time you run an
executable file.
• Use a virus scan before you open any new programs or files that may
contain executable code. This includes packaged software that you buy
from the store as well as any program you might download from the
Internet.
Keeping Computer Virus Free…
• If you are a member of an online community or chat room, be very
careful about accepting files or clicking links that you find or that
people send you within the community.
• Make sure you back up your data (documents, bookmark files,
important email messages, etc.) on disc so that in the event of a
virus infection, you do not lose valuable work.
• Scan all incoming email attachments
• The more computers flash cards, CDs, zip cards and floppies have
been used on, the better the chance of a virus infecting them –
clean them before use
Anti-viruses
• “Antivirus" is protective software designed to defend your
computer against malicious software. Malicious software, or
"malware" includes: viruses, Trojans, keyloggers, hijackers,
dialers, and other code that vandalizes or steals your computer
contents. In order to be an effective defense, your antivirus
software needs to run in the background at all times, and should
be kept updated so it recognizes new versions of malicious
software.
Some facts…
• Mydoom Virus in January 2004 infected almost 1 million computers
in as little as one day
• Melissa Virus in March 1999 was powerful enough to have Microsoft
and various other companies to shut down emailing systems until
the virus could finally be stopped.
• Storm Worm in January 2007 was said to have infected 50,000
computers by October of that year.
• Over 6,000 new computer viruses are released every month.
Some facts…
• The first virus that came into wild was elk cloner virus.This virus
was created by Richard Skrenta in 1981 when he was a student in
high school.He created it as a joke and inserted it in a game on a
floppy disk.The elk cloner virus get activated on its 50th use and
displays a poem "Elk Cloner: The program with a personality."
• Farooq Alvi Brothers of Lahore,Pakistan created the first pc virus
in 1986.It was a boot sector virus.
• The term virus to denote a self replicating program was first used
in 1969 in a short story of a Galaxy Magaine written by David
Gerrold.
Conclusion…
• I think with enough knowledge about viruses and the right kind of
software they can almost be preventable, you just have to use
common sense.
• Don’t open emails and download software that does not look like
it is from a reliable source
• Download Software that prevents and helps protect against
viruses
computer viruses

More Related Content

What's hot

Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virusKriti kohli
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all timeAlefyaM
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?cnbweg45
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 

What's hot (20)

Computer worm
Computer wormComputer worm
Computer worm
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 

Similar to computer viruses

Similar to computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
computer vipin kumar ppt
computer vipin kumar pptcomputer vipin kumar ppt
computer vipin kumar ppt
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Malicious
MaliciousMalicious
Malicious
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

computer viruses

  • 1.
  • 2. Overview Meaning History How do we get viruses ? Effects of computer viruses Types of computer infections Keeping computer virus free Anti-viruses Some facts Conclusion
  • 3. Meaning • A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  • 4. History… • The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. • Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1971. • Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. • Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Reaper program was created to delete Creeper.
  • 5. How Do We Get Viruses ?      Sharing music, files or photos with other users Visiting an infected Web site Opening spam email or an email attachment Downloading free games, toolbars, media players and other system utilities Installing mainstream software applications without fully reading license agreements
  • 6. Effects of Viruses Slow computer performance Erratic computer behavior Unexplained data loss Frequent computer crashes Sapping computer memory  Files/Directories disappear  Denial of service
  • 7. Types of Computer Infection Viruses
  • 8. Meaning…. Trojans Viruses Worms Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action
  • 9. Keeping Computer Virus Free • Install anti-virus software from a reputable vendor. Update it and use it regularly. • In addition to scanning for viruses on a regular basis, install an "on access" scanner (included in most anti-virus software packages) and configure it to start each time you start up your computer. This will protect your system by checking for viruses each time you run an executable file. • Use a virus scan before you open any new programs or files that may contain executable code. This includes packaged software that you buy from the store as well as any program you might download from the Internet.
  • 10. Keeping Computer Virus Free… • If you are a member of an online community or chat room, be very careful about accepting files or clicking links that you find or that people send you within the community. • Make sure you back up your data (documents, bookmark files, important email messages, etc.) on disc so that in the event of a virus infection, you do not lose valuable work. • Scan all incoming email attachments • The more computers flash cards, CDs, zip cards and floppies have been used on, the better the chance of a virus infecting them – clean them before use
  • 11. Anti-viruses • “Antivirus" is protective software designed to defend your computer against malicious software. Malicious software, or "malware" includes: viruses, Trojans, keyloggers, hijackers, dialers, and other code that vandalizes or steals your computer contents. In order to be an effective defense, your antivirus software needs to run in the background at all times, and should be kept updated so it recognizes new versions of malicious software.
  • 12.
  • 13. Some facts… • Mydoom Virus in January 2004 infected almost 1 million computers in as little as one day • Melissa Virus in March 1999 was powerful enough to have Microsoft and various other companies to shut down emailing systems until the virus could finally be stopped. • Storm Worm in January 2007 was said to have infected 50,000 computers by October of that year. • Over 6,000 new computer viruses are released every month.
  • 14. Some facts… • The first virus that came into wild was elk cloner virus.This virus was created by Richard Skrenta in 1981 when he was a student in high school.He created it as a joke and inserted it in a game on a floppy disk.The elk cloner virus get activated on its 50th use and displays a poem "Elk Cloner: The program with a personality." • Farooq Alvi Brothers of Lahore,Pakistan created the first pc virus in 1986.It was a boot sector virus. • The term virus to denote a self replicating program was first used in 1969 in a short story of a Galaxy Magaine written by David Gerrold.
  • 15. Conclusion… • I think with enough knowledge about viruses and the right kind of software they can almost be preventable, you just have to use common sense. • Don’t open emails and download software that does not look like it is from a reliable source • Download Software that prevents and helps protect against viruses