SlideShare a Scribd company logo
Computer
Virus
A computer virus is a malicious piece of computer code designed to spread from
device to device. A subset of malware, these self-copying threats are usually
designed to damage a device or steal data
Think of a biological virus
The kind that makes you sick. It’s persistently nasty,
keeps you from functioning normally, and often requires
something powerful to get rid of it.
A computer virus is very similar
Designed to replicate relentlessly, computer viruses infect
your programs and files, alter the way your computer
operates or stop it from working altogether.
What is Virus?
What does a computer virus do?
Some computer viruses are programmed to harm your
computer by damaging programs, deleting files, or
reformatting the hard drive. Others simply replicate
themselves or flood a network with traffic, making it
impossible to perform any internet activity. Even less
harmful computer viruses can significantly disrupt your
system’s performance, sapping computer memory and
causing frequent computer crashes.
Do You Know?
First PC virus was created by two Pakistani brothers Amjad Farooq Alvi and Basit Farooq Alvi in 1986. This virus
was called Brain and It was the first PC virus that began infecting floppy disks.
How does a computer get a virus?
Even if you’re careful, you can pick up computer viruses through normal Web activities like:
• Sharing music, files, or photos with other users
• Visiting an infected website
• Opening spam email or an email attachment
• Downloading pirated games, toolbars, media players and other system utilities
• Installing mainstream software applications without thoroughly reading license agreements
How do computer viruses spread?
The first known infections
from SARS-CoV-2 were
discovered in Wuhan,
China.
It started from one city
and in a short time period,
it was spread almost all
over the world.
How do computer viruses spread?
Viruses can be spread several ways:
Networks Discs
Email Attachments
External Storage Devices
According to the U.S. Cybersecurity and Infrastructure Security Agency, infected email attachments
are the most common means of circulating computer viruses.
Most, but not all, computer viruses require a user to take some form of action, like enabling
“macros” or clicking a link, to spread.
What are the symptoms of a computer virus?
Your computer may be infected if you recognize any of these malware symptoms:
Slow Computer Erratic Computer Behavior Unexplained data loss Frequent computer crashes
How are computer viruses removed?
Antiviruses have made great progress in being able to identify and prevent the spread of
computer viruses. When a device does become infected, though, installing an antivirus
solution is still your best bet for removing it.
Once installed, most software will conduct a “scan” for the malicious program. Once
located, the antivirus will present options for its removal. If this is not something that can
be done automatically, some security vendors offer a technician’s assistance in removing
the virus free of charge.
Examples of computer viruses
While tens of thousands of computer viruses still roam the internet, they have diversified their methods and are
now joined by several malware variants like:
A worm is a type of virus that, unlike traditional viruses, usually does not require
the action of a user to spread from device to device..
As in the myth, a Trojan is a virus that hides within a legitimate-seeming program to
spread itself across networks or devices.
Ransomware is a type of malware that encrypts a user’s files and demands
a ransom for its return. Ransomware can be, but isn’t necessarily, spread
through computer viruses.
How Does Antivirus Work?
• An antivirus software works by scanning incoming files or code that's being passed through your network traffic.
• Companies who build this software compile an extensive database of already known viruses and malware
and teach the software how to detect, flag, and remove them.
• When files, programs, and applications are flowing in and out of your computer, the antivirus compares them to
its database to find matches. Matches that are similar or identical to the database are isolated, scanned, and
removed.
Computer virus protection
• Use antivirus protection and a firewall
• Get antispyware software
• Always keep your antivirus protection and antispyware software up-to-date
• Update your operating system regularly
• Increase your browser security settings
• Avoid questionable Websites
• Only download software from sites you trust.
• Carefully evaluate free software and file-sharing applications before downloading
them.
• Don't open messages from unknown senders
• Immediately delete messages you suspect to be spam

More Related Content

What's hot

virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer virus
Computer virusComputer virus
Computer virus
Walden University
 
Computer virus
 Computer virus Computer virus
Computer virus
Kawsar Ahmed
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
Mohak Jain
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
SimiAttri
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
Leonor Costa
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
Eva Harshita
 
Computer Virus
Computer VirusComputer Virus
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
shimaBarason
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
Kriti kohli
 

What's hot (20)

virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 

Similar to Computer Virus

Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Virus
VirusVirus
Virus
VirusVirus
Virus
dddaou
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
Blogger
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
Vikas Chandwani
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
AnzaDar3
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
Dr. Mazin Mohamed alkathiri
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
Computer Science
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
Sanguine_Eva
 

Similar to Computer Virus (20)

Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation2
Presentation2Presentation2
Presentation2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
information about virus
information about virusinformation about virus
information about virus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Computer Virus

  • 2. A computer virus is a malicious piece of computer code designed to spread from device to device. A subset of malware, these self-copying threats are usually designed to damage a device or steal data Think of a biological virus The kind that makes you sick. It’s persistently nasty, keeps you from functioning normally, and often requires something powerful to get rid of it. A computer virus is very similar Designed to replicate relentlessly, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. What is Virus?
  • 3. What does a computer virus do? Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes. Do You Know? First PC virus was created by two Pakistani brothers Amjad Farooq Alvi and Basit Farooq Alvi in 1986. This virus was called Brain and It was the first PC virus that began infecting floppy disks.
  • 4. How does a computer get a virus? Even if you’re careful, you can pick up computer viruses through normal Web activities like: • Sharing music, files, or photos with other users • Visiting an infected website • Opening spam email or an email attachment • Downloading pirated games, toolbars, media players and other system utilities • Installing mainstream software applications without thoroughly reading license agreements
  • 5. How do computer viruses spread? The first known infections from SARS-CoV-2 were discovered in Wuhan, China. It started from one city and in a short time period, it was spread almost all over the world.
  • 6. How do computer viruses spread? Viruses can be spread several ways: Networks Discs Email Attachments External Storage Devices According to the U.S. Cybersecurity and Infrastructure Security Agency, infected email attachments are the most common means of circulating computer viruses. Most, but not all, computer viruses require a user to take some form of action, like enabling “macros” or clicking a link, to spread.
  • 7. What are the symptoms of a computer virus? Your computer may be infected if you recognize any of these malware symptoms: Slow Computer Erratic Computer Behavior Unexplained data loss Frequent computer crashes
  • 8. How are computer viruses removed? Antiviruses have made great progress in being able to identify and prevent the spread of computer viruses. When a device does become infected, though, installing an antivirus solution is still your best bet for removing it. Once installed, most software will conduct a “scan” for the malicious program. Once located, the antivirus will present options for its removal. If this is not something that can be done automatically, some security vendors offer a technician’s assistance in removing the virus free of charge.
  • 9. Examples of computer viruses While tens of thousands of computer viruses still roam the internet, they have diversified their methods and are now joined by several malware variants like: A worm is a type of virus that, unlike traditional viruses, usually does not require the action of a user to spread from device to device.. As in the myth, a Trojan is a virus that hides within a legitimate-seeming program to spread itself across networks or devices. Ransomware is a type of malware that encrypts a user’s files and demands a ransom for its return. Ransomware can be, but isn’t necessarily, spread through computer viruses.
  • 10. How Does Antivirus Work? • An antivirus software works by scanning incoming files or code that's being passed through your network traffic. • Companies who build this software compile an extensive database of already known viruses and malware and teach the software how to detect, flag, and remove them. • When files, programs, and applications are flowing in and out of your computer, the antivirus compares them to its database to find matches. Matches that are similar or identical to the database are isolated, scanned, and removed.
  • 11. Computer virus protection • Use antivirus protection and a firewall • Get antispyware software • Always keep your antivirus protection and antispyware software up-to-date • Update your operating system regularly • Increase your browser security settings • Avoid questionable Websites • Only download software from sites you trust. • Carefully evaluate free software and file-sharing applications before downloading them. • Don't open messages from unknown senders • Immediately delete messages you suspect to be spam