SlideShare a Scribd company logo
Lecture No. 4: Computer Viruses
Lecturer: Dr. Mazin Alkathiri
Department of Computer Science,
Faculty of Applied Science,
Seiyun University
2023
Computer Viruses
A virus is a computer code or malware program, which is
capable of affecting computer data badly by corrupting or
destroying them. cause a computer to behave in unexpected
ways, or interfere with the operation of the network, all while
concealing and replicating itself.
The defining characteristic of viruses is that they are self-
replicating computer programs which install themselves without
the user's consent.
◦ Some virus writers consider their creations to be works of art, and see virus
writing as a creative hobby.
◦ Viruses have been written as research projects, pranks, vandalism, to attack the
products of specific companies.
◦ Some viruses were intended as "good viruses". They spread improvements to the
programs they infect, or delete other viruses.
 These viruses are, however, quite rare, still consume system resources, may accidentally
damage systems they infect.
 Following are the major types of computer virus −
1. Worms
This is a computer program that replicates itself at a swift pace. Unlike a computer
virus, it is self-contained and hence does not need to be part of another program to
propagate itself.
• burrow through and between networks to change or overwrite data.
2. Trojan Horse
A Trojan Horse is also a sort of destructive program that remains disguised in a normal
software program.
 appear to be legitimate programs but when opened, damage software codes.
3. Bombs
It is similar to Trojan Horse, but Logic bombs have some specialty; these include a
timing device and hence it will go off only at a particular date and time.
 Boot Sector Virus
◦ Infects the boot or MBR of diskettes and hard drives
through the sharing of infected disks and pirated software
applications
◦ Once your hard drive is infected all diskettes that you use in
your computer will be infected
 Program Virus
◦ Becomes active when the program file (usually with
extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus
is opened
◦ It then makes copies of itself and will infect other programs
on the computer
 Multipartite Virus
◦ Hybrid of a Boot Sector and Program viruses
◦ It infects program files and when the infected program is
active it will affect the boot record
 Stealth Virus
◦ Disguises itself to prevent from being detected by antivirus
software
◦ It alters its file size or conceals itself in memory
 Polymorphic Virus
◦ Act like a chameleon, changing its virus signature (binary
pattern) every time it multiples and infects a new file
 Macro Virus
◦ Programmed as a macro embedded in a document, usually
found in Microsoft Word and Excel
◦ Once it gets in to your computer, every document you
produce will become infected
◦ Relatively new type of virus and may slip by your antivirus
software if you don't have the most recent version installed
1. Mydoom – $38 billion – 2004
Also known as Novarg, this malware is technically a “worm,” spread by mass emailing
2. Sobig – $30 billion - 2003
This cybercriminal program masqueraded as legitimate computer software attached to emails.
3. Klez – $19.8 billion – 2001
The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other
viruses.
4. ILOVEYOU – $15 billion – 2000
Worked by sending a bogus “love letter” that looked like a harmless text file.
5. WannaCry – $4 billion - 2017
Ransomware, a virus that takes over your computer (or cloud files) and holds them hostage.
6. Zeus – $3 billion – 2007
Online theft tool that hit the web
7. Code Red – $2.4 billion – 2001
Another worm that penetrated 975,000 hosts.
8. Slammer – $1.2 billion – 2003
It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic.
9. CryptoLocker – $665 million – 2013
Ransomware attacks - This malware attacked upwards of 250,000 machines by encrypting their files.
10. Sasser – $500 million - 2004
worm was written by a 17-year-old German computer science student named Sven Jaschan.
 Computer viruses cost an estimated $55 billion each year in cleanup and repair costs. The biggest
computer virus ever is the Mydoom virus, which did an estimated $38 billion in damages in 2004.
 By downloading files from the Internet.
 During the removable of media or drives.
 Through pen drive.
 Through e-mail attachments.
 Through unpatched software & services.
 Through unprotected or poor administrator passwords.
 impact of virus on computer systems −
 Disrupts the normal functionality of respective computer system.
 Disrupts system network use.
 Modifies configuration setting of the system.
 Destructs data.
 Disrupts computer network resources.
 Access confidential data.
 The most fundamental method of detection of virus is to check the functionality of
your computer system; a virus affected computer does not take command properly.
 However, if there is antivirus software in your computer system, then it can easily
check programs and files on a system for virus signatures.
 Functions slower than normal
 Responds slowly and freezes often
 Restarts itself often
 See uncommon error messages, distorted menus, and dialog
boxes
 Notice applications fail to work correctly
 Fail to print correctly
Different virus preventive measures.
Installation of an effective antivirus software.
Patching up the operating system.
Patching up the client software.
Putting highly secured Passwords.
Use of Firewalls.
 Following are the Best Antivirus Software of 2023
◦ Bitdefender: Best Overall
◦ Avira: Best Value for Your Money
◦ AVG: Best for Solo Entrepreneurs
◦ McAfee: Best for Multi-Device Protection
◦ Malwarebytes: Best for Real-Time Protection
◦ Avast: Best for Remote Workers
◦ F-Secure: Best for Plan Customization
◦ G DATA: Best for Comprehensive Features
◦ Trend Micro: Best for Phishing Protection
◦ ESET: Best for Technical Users

More Related Content

Similar to Computer Introduction-Lecture04

Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
Md.Tanvir Ul Haque
 
Computer virus
Computer virusComputer virus
Computer virus
Mark Anthony Maranga
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
MDAZAD53
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
SridharChowdary10
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
glainAE
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
Khaleel Assadi
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
Imtiaz Ahmed
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 

Similar to Computer Introduction-Lecture04 (20)

Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

More from Dr. Mazin Mohamed alkathiri

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Dr. Mazin Mohamed alkathiri
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 05
Advance Mobile Application Development class 05Advance Mobile Application Development class 05
Advance Mobile Application Development class 05
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
Dr. Mazin Mohamed alkathiri
 
OS-operating systems- ch03
OS-operating systems- ch03OS-operating systems- ch03
OS-operating systems- ch03
Dr. Mazin Mohamed alkathiri
 
OS-operating systems - ch02 - part-2-2024
OS-operating systems - ch02 - part-2-2024OS-operating systems - ch02 - part-2-2024
OS-operating systems - ch02 - part-2-2024
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 04
Advance Mobile Application Development class 04Advance Mobile Application Development class 04
Advance Mobile Application Development class 04
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 03
Advance Mobile Application Development class 03Advance Mobile Application Development class 03
Advance Mobile Application Development class 03
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 02-B
Advance Mobile Application Development class 02-BAdvance Mobile Application Development class 02-B
Advance Mobile Application Development class 02-B
Dr. Mazin Mohamed alkathiri
 
OS-ch02-part-1-2024.ppt
OS-ch02-part-1-2024.pptOS-ch02-part-1-2024.ppt
OS-ch02-part-1-2024.ppt
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 02
Advance Mobile Application Development class 02Advance Mobile Application Development class 02
Advance Mobile Application Development class 02
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
Dr. Mazin Mohamed alkathiri
 
Advance Mobile Application Development class 01
Advance Mobile Application Development class 01Advance Mobile Application Development class 01
Advance Mobile Application Development class 01
Dr. Mazin Mohamed alkathiri
 
ESSENTIAL of (CS/IT/IS) class 02 (HCI)
ESSENTIAL of (CS/IT/IS) class 02 (HCI)ESSENTIAL of (CS/IT/IS) class 02 (HCI)
ESSENTIAL of (CS/IT/IS) class 02 (HCI)
Dr. Mazin Mohamed alkathiri
 
Seminar
SeminarSeminar
ESSENTIAL of (CS/IT/IS)
ESSENTIAL of (CS/IT/IS)ESSENTIAL of (CS/IT/IS)
ESSENTIAL of (CS/IT/IS)
Dr. Mazin Mohamed alkathiri
 
OS-ch01-2024.ppt
OS-ch01-2024.pptOS-ch01-2024.ppt
OS-ch01-2024.ppt
Dr. Mazin Mohamed alkathiri
 

More from Dr. Mazin Mohamed alkathiri (20)

OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Advance Mobile Application Development class 05
Advance Mobile Application Development class 05Advance Mobile Application Development class 05
Advance Mobile Application Development class 05
 
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
ESSENTIAL of (CS/IT/IS) class 05 (Software concepts)
 
OS-operating systems- ch03
OS-operating systems- ch03OS-operating systems- ch03
OS-operating systems- ch03
 
OS-operating systems - ch02 - part-2-2024
OS-operating systems - ch02 - part-2-2024OS-operating systems - ch02 - part-2-2024
OS-operating systems - ch02 - part-2-2024
 
Advance Mobile Application Development class 04
Advance Mobile Application Development class 04Advance Mobile Application Development class 04
Advance Mobile Application Development class 04
 
Advance Mobile Application Development class 03
Advance Mobile Application Development class 03Advance Mobile Application Development class 03
Advance Mobile Application Development class 03
 
Advance Mobile Application Development class 02-B
Advance Mobile Application Development class 02-BAdvance Mobile Application Development class 02-B
Advance Mobile Application Development class 02-B
 
OS-ch02-part-1-2024.ppt
OS-ch02-part-1-2024.pptOS-ch02-part-1-2024.ppt
OS-ch02-part-1-2024.ppt
 
Advance Mobile Application Development class 02
Advance Mobile Application Development class 02Advance Mobile Application Development class 02
Advance Mobile Application Development class 02
 
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
ESSENTIAL of (CS/IT/IS) class 03-04 (NUMERIC SYSTEMS)
 
Advance Mobile Application Development class 01
Advance Mobile Application Development class 01Advance Mobile Application Development class 01
Advance Mobile Application Development class 01
 
ESSENTIAL of (CS/IT/IS) class 02 (HCI)
ESSENTIAL of (CS/IT/IS) class 02 (HCI)ESSENTIAL of (CS/IT/IS) class 02 (HCI)
ESSENTIAL of (CS/IT/IS) class 02 (HCI)
 
Seminar
SeminarSeminar
Seminar
 
ESSENTIAL of (CS/IT/IS)
ESSENTIAL of (CS/IT/IS)ESSENTIAL of (CS/IT/IS)
ESSENTIAL of (CS/IT/IS)
 
OS-ch01-2024.ppt
OS-ch01-2024.pptOS-ch01-2024.ppt
OS-ch01-2024.ppt
 

Recently uploaded

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 

Recently uploaded (20)

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 

Computer Introduction-Lecture04

  • 1. Lecture No. 4: Computer Viruses Lecturer: Dr. Mazin Alkathiri Department of Computer Science, Faculty of Applied Science, Seiyun University 2023
  • 2. Computer Viruses A virus is a computer code or malware program, which is capable of affecting computer data badly by corrupting or destroying them. cause a computer to behave in unexpected ways, or interfere with the operation of the network, all while concealing and replicating itself. The defining characteristic of viruses is that they are self- replicating computer programs which install themselves without the user's consent.
  • 3. ◦ Some virus writers consider their creations to be works of art, and see virus writing as a creative hobby. ◦ Viruses have been written as research projects, pranks, vandalism, to attack the products of specific companies. ◦ Some viruses were intended as "good viruses". They spread improvements to the programs they infect, or delete other viruses.  These viruses are, however, quite rare, still consume system resources, may accidentally damage systems they infect.
  • 4.  Following are the major types of computer virus − 1. Worms This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is self-contained and hence does not need to be part of another program to propagate itself. • burrow through and between networks to change or overwrite data.
  • 5. 2. Trojan Horse A Trojan Horse is also a sort of destructive program that remains disguised in a normal software program.  appear to be legitimate programs but when opened, damage software codes.
  • 6. 3. Bombs It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device and hence it will go off only at a particular date and time.
  • 7.  Boot Sector Virus ◦ Infects the boot or MBR of diskettes and hard drives through the sharing of infected disks and pirated software applications ◦ Once your hard drive is infected all diskettes that you use in your computer will be infected  Program Virus ◦ Becomes active when the program file (usually with extensions .BIN, .COM, .EXE, .OVL, .DRV) carrying the virus is opened ◦ It then makes copies of itself and will infect other programs on the computer  Multipartite Virus ◦ Hybrid of a Boot Sector and Program viruses ◦ It infects program files and when the infected program is active it will affect the boot record
  • 8.  Stealth Virus ◦ Disguises itself to prevent from being detected by antivirus software ◦ It alters its file size or conceals itself in memory  Polymorphic Virus ◦ Act like a chameleon, changing its virus signature (binary pattern) every time it multiples and infects a new file  Macro Virus ◦ Programmed as a macro embedded in a document, usually found in Microsoft Word and Excel ◦ Once it gets in to your computer, every document you produce will become infected ◦ Relatively new type of virus and may slip by your antivirus software if you don't have the most recent version installed
  • 9. 1. Mydoom – $38 billion – 2004 Also known as Novarg, this malware is technically a “worm,” spread by mass emailing 2. Sobig – $30 billion - 2003 This cybercriminal program masqueraded as legitimate computer software attached to emails. 3. Klez – $19.8 billion – 2001 The Klez worm sent fake emails, spoofed recognized senders and, among other things, attempted to deactivate other viruses. 4. ILOVEYOU – $15 billion – 2000 Worked by sending a bogus “love letter” that looked like a harmless text file. 5. WannaCry – $4 billion - 2017 Ransomware, a virus that takes over your computer (or cloud files) and holds them hostage. 6. Zeus – $3 billion – 2007 Online theft tool that hit the web 7. Code Red – $2.4 billion – 2001 Another worm that penetrated 975,000 hosts. 8. Slammer – $1.2 billion – 2003 It used these victim machines to launch a DDoS attack on several internet hosts, significantly slowing internet traffic. 9. CryptoLocker – $665 million – 2013 Ransomware attacks - This malware attacked upwards of 250,000 machines by encrypting their files. 10. Sasser – $500 million - 2004 worm was written by a 17-year-old German computer science student named Sven Jaschan.  Computer viruses cost an estimated $55 billion each year in cleanup and repair costs. The biggest computer virus ever is the Mydoom virus, which did an estimated $38 billion in damages in 2004.
  • 10.  By downloading files from the Internet.  During the removable of media or drives.  Through pen drive.  Through e-mail attachments.  Through unpatched software & services.  Through unprotected or poor administrator passwords.
  • 11.  impact of virus on computer systems −  Disrupts the normal functionality of respective computer system.  Disrupts system network use.  Modifies configuration setting of the system.  Destructs data.  Disrupts computer network resources.  Access confidential data.
  • 12.  The most fundamental method of detection of virus is to check the functionality of your computer system; a virus affected computer does not take command properly.  However, if there is antivirus software in your computer system, then it can easily check programs and files on a system for virus signatures.
  • 13.  Functions slower than normal  Responds slowly and freezes often  Restarts itself often  See uncommon error messages, distorted menus, and dialog boxes  Notice applications fail to work correctly  Fail to print correctly
  • 14. Different virus preventive measures. Installation of an effective antivirus software. Patching up the operating system. Patching up the client software. Putting highly secured Passwords. Use of Firewalls.
  • 15.  Following are the Best Antivirus Software of 2023 ◦ Bitdefender: Best Overall ◦ Avira: Best Value for Your Money ◦ AVG: Best for Solo Entrepreneurs ◦ McAfee: Best for Multi-Device Protection ◦ Malwarebytes: Best for Real-Time Protection ◦ Avast: Best for Remote Workers ◦ F-Secure: Best for Plan Customization ◦ G DATA: Best for Comprehensive Features ◦ Trend Micro: Best for Phishing Protection ◦ ESET: Best for Technical Users