SlideShare a Scribd company logo
1 of 16
Computer VirusesComputer Viruses
Govt. engineering collageGovt. engineering collage
Rewa M.P.Rewa M.P.
Submitted to:- Dr. Manoj ChauhanSubmitted to:- Dr. Manoj Chauhan
Submitted by :- Saurabh MishraSubmitted by :- Saurabh Mishra
EE 2018 2EE 2018 2ndnd
semsem
Govt. engineering collageGovt. engineering collage
Rewa M.P.Rewa M.P.
Submitted to:- Dr. Manoj ChauhanSubmitted to:- Dr. Manoj Chauhan
Submitted by :- Saurabh MishraSubmitted by :- Saurabh Mishra
EE 2018 2EE 2018 2ndnd
semsem
Definition of VirusDefinition of Virus
 A virus is a small piece of software thatA virus is a small piece of software that
piggybacks on real programs in order to getpiggybacks on real programs in order to get
executedexecuted
 Once it’s running, it spreads by insertingOnce it’s running, it spreads by inserting
copies of itself into other executable code orcopies of itself into other executable code or
documentsdocuments
VIRUSVIRUS
 A computer virus is a program that is designed to damage or disrupt theA computer virus is a program that is designed to damage or disrupt the
normal functions of your computer andnormal functions of your computer and
 its files.its files.
 Like biological viruses, computer viruses attach themselves to a host,Like biological viruses, computer viruses attach themselves to a host,
usually a program file, data file, or a fileusually a program file, data file, or a file
 in your computer's operating system. From here, it replicates itself,in your computer's operating system. From here, it replicates itself,
spreading the infection to other files.spreading the infection to other files.
 viruses are transmitted from computer to computerviruses are transmitted from computer to computer
 Viruses can find their way onto your computer in many different ways.Viruses can find their way onto your computer in many different ways.
 Viruses can be transmitted by email, in downloads from the internet,Viruses can be transmitted by email, in downloads from the internet,
through network connections, by floppythrough network connections, by floppy
 disks or by CDs, particular those that have been burnt on a computerdisks or by CDs, particular those that have been burnt on a computer
infected by viruses.infected by viruses.
Money flowMoney flow
 Pay per clickPay per click
How it works?How it works?
 The flood of incoming messages to the targetThe flood of incoming messages to the target
system essentially forces it to shut down, therebysystem essentially forces it to shut down, thereby
denying service to the system to legitimate users.denying service to the system to legitimate users.
 Victim's IP address.Victim's IP address.
 Victim's port number.Victim's port number.
 Attacking packet size.Attacking packet size.
 Attacking interpacket delay.Attacking interpacket delay.
 Duration of attack.Duration of attack.
 MyDoom – SCO GroupMyDoom – SCO Group
WANNA CRYWANNA CRY
 The WannaCry ransomware attack was a MayThe WannaCry ransomware attack was a May
2017 worldwide cyberattack by the WannaCry2017 worldwide cyberattack by the WannaCry
ransomware cryptoworm, which targetedransomware cryptoworm, which targeted
computers running the Microsoft Windowscomputers running the Microsoft Windows
operating system by encrypting data andoperating system by encrypting data and
demanding ransom payments in the Bitcoindemanding ransom payments in the Bitcoin
cryptocurrency. It propagated throughcryptocurrency. It propagated through
EternalBlue, an exploit in older Windows systemsEternalBlue, an exploit in older Windows systems
released by The Shadow Brokers a few monthsreleased by The Shadow Brokers a few months
prior to the attack.prior to the attack.
Typical things that some currentTypical things that some current
Personal Computer (PC) viruses doPersonal Computer (PC) viruses do
 Display a messageDisplay a message
Boot Sector VirusesBoot Sector Viruses
 Traditional VirusTraditional Virus
 infect the boot sector on floppy disks andinfect the boot sector on floppy disks and
hard diskshard disks
 By putting its code in the boot sector, aBy putting its code in the boot sector, a
virus can guarantee it gets executedvirus can guarantee it gets executed
 load itself into memory immediately, and itload itself into memory immediately, and it
is able to run whenever the computer is onis able to run whenever the computer is on
Executable VirusesExecutable Viruses
 Traditional VirusesTraditional Viruses
 pieces of code attached to a legitimatepieces of code attached to a legitimate
programprogram
 run when the legitimate program getsrun when the legitimate program gets
executedexecuted
 loads itself into memory and looks aroundloads itself into memory and looks around
to see if it can find any other programs onto see if it can find any other programs on
the diskthe disk
E-mail VirusesE-mail Viruses
 Moves around in e-mail messagesMoves around in e-mail messages
 Replicates itself by automatically mailingReplicates itself by automatically mailing
itself to dozens of people in the victim’s e-itself to dozens of people in the victim’s e-
mail address bookmail address book
 Example:Example: Melissa virusMelissa virus,, ILOVEYOU virusILOVEYOU virus
PreventionPrevention
 UpdatesUpdates
 Anti-VirusesAnti-Viruses
 More secure operating systemsMore secure operating systems
e.g. UNIXe.g. UNIX
ReferenceReference
 http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gifhttp://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
 http://www.factmonster.com/ipka/A0872842.htmlhttp://www.factmonster.com/ipka/A0872842.html
http://www.faqs.org/faqs/computer-virus/new-users/http://www.faqs.org/faqs/computer-virus/new-users/
 http://www.mines.edu/academic/computer/viri-sysadmin.htmhttp://www.mines.edu/academic/computer/viri-sysadmin.htm
EndEnd
THANK YOUTHANK YOU

More Related Content

What's hot

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virusNaveen Goyal
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 

What's hot (20)

Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
ppt on antivirus and computer virus
ppt on antivirus and computer virusppt on antivirus and computer virus
ppt on antivirus and computer virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Malware
MalwareMalware
Malware
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Presentation2
Presentation2Presentation2
Presentation2
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Malewareanalysis
Malewareanalysis Malewareanalysis
Malewareanalysis
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 

Similar to Viruses ppt finale (20)

Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses
VirusesViruses
Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and Anti virus
Virus and Anti virusVirus and Anti virus
Virus and Anti virus
 
Virus
VirusVirus
Virus
 
virus
virusvirus
virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
computer-viruses
computer-virusescomputer-viruses
computer-viruses
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Viruses ppt finale

  • 1. Computer VirusesComputer Viruses Govt. engineering collageGovt. engineering collage Rewa M.P.Rewa M.P. Submitted to:- Dr. Manoj ChauhanSubmitted to:- Dr. Manoj Chauhan Submitted by :- Saurabh MishraSubmitted by :- Saurabh Mishra EE 2018 2EE 2018 2ndnd semsem Govt. engineering collageGovt. engineering collage Rewa M.P.Rewa M.P. Submitted to:- Dr. Manoj ChauhanSubmitted to:- Dr. Manoj Chauhan Submitted by :- Saurabh MishraSubmitted by :- Saurabh Mishra EE 2018 2EE 2018 2ndnd semsem
  • 2. Definition of VirusDefinition of Virus  A virus is a small piece of software thatA virus is a small piece of software that piggybacks on real programs in order to getpiggybacks on real programs in order to get executedexecuted  Once it’s running, it spreads by insertingOnce it’s running, it spreads by inserting copies of itself into other executable code orcopies of itself into other executable code or documentsdocuments
  • 3.
  • 4. VIRUSVIRUS  A computer virus is a program that is designed to damage or disrupt theA computer virus is a program that is designed to damage or disrupt the normal functions of your computer andnormal functions of your computer and  its files.its files.  Like biological viruses, computer viruses attach themselves to a host,Like biological viruses, computer viruses attach themselves to a host, usually a program file, data file, or a fileusually a program file, data file, or a file  in your computer's operating system. From here, it replicates itself,in your computer's operating system. From here, it replicates itself, spreading the infection to other files.spreading the infection to other files.  viruses are transmitted from computer to computerviruses are transmitted from computer to computer  Viruses can find their way onto your computer in many different ways.Viruses can find their way onto your computer in many different ways.  Viruses can be transmitted by email, in downloads from the internet,Viruses can be transmitted by email, in downloads from the internet, through network connections, by floppythrough network connections, by floppy  disks or by CDs, particular those that have been burnt on a computerdisks or by CDs, particular those that have been burnt on a computer infected by viruses.infected by viruses.
  • 5. Money flowMoney flow  Pay per clickPay per click
  • 6. How it works?How it works?  The flood of incoming messages to the targetThe flood of incoming messages to the target system essentially forces it to shut down, therebysystem essentially forces it to shut down, thereby denying service to the system to legitimate users.denying service to the system to legitimate users.  Victim's IP address.Victim's IP address.  Victim's port number.Victim's port number.  Attacking packet size.Attacking packet size.  Attacking interpacket delay.Attacking interpacket delay.  Duration of attack.Duration of attack.  MyDoom – SCO GroupMyDoom – SCO Group
  • 7. WANNA CRYWANNA CRY  The WannaCry ransomware attack was a MayThe WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targetedransomware cryptoworm, which targeted computers running the Microsoft Windowscomputers running the Microsoft Windows operating system by encrypting data andoperating system by encrypting data and demanding ransom payments in the Bitcoindemanding ransom payments in the Bitcoin cryptocurrency. It propagated throughcryptocurrency. It propagated through EternalBlue, an exploit in older Windows systemsEternalBlue, an exploit in older Windows systems released by The Shadow Brokers a few monthsreleased by The Shadow Brokers a few months prior to the attack.prior to the attack.
  • 8. Typical things that some currentTypical things that some current Personal Computer (PC) viruses doPersonal Computer (PC) viruses do  Display a messageDisplay a message
  • 9. Boot Sector VirusesBoot Sector Viruses  Traditional VirusTraditional Virus  infect the boot sector on floppy disks andinfect the boot sector on floppy disks and hard diskshard disks  By putting its code in the boot sector, aBy putting its code in the boot sector, a virus can guarantee it gets executedvirus can guarantee it gets executed  load itself into memory immediately, and itload itself into memory immediately, and it is able to run whenever the computer is onis able to run whenever the computer is on
  • 10. Executable VirusesExecutable Viruses  Traditional VirusesTraditional Viruses  pieces of code attached to a legitimatepieces of code attached to a legitimate programprogram  run when the legitimate program getsrun when the legitimate program gets executedexecuted  loads itself into memory and looks aroundloads itself into memory and looks around to see if it can find any other programs onto see if it can find any other programs on the diskthe disk
  • 11. E-mail VirusesE-mail Viruses  Moves around in e-mail messagesMoves around in e-mail messages  Replicates itself by automatically mailingReplicates itself by automatically mailing itself to dozens of people in the victim’s e-itself to dozens of people in the victim’s e- mail address bookmail address book  Example:Example: Melissa virusMelissa virus,, ILOVEYOU virusILOVEYOU virus
  • 12. PreventionPrevention  UpdatesUpdates  Anti-VirusesAnti-Viruses  More secure operating systemsMore secure operating systems e.g. UNIXe.g. UNIX
  • 13.
  • 14.