SlideShare a Scribd company logo
COMPUTER VIRUS
Kavya Deth
Computer Virus
• Malware
• Spyware
• Trojan Horse
Malware
Malware, short for malicious software, is any software
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
Malware is defined by its malicious intent, acting against
the requirements of the computer user, and does not
include software that causes unintentional harm due to
some deficiency. The term badware is sometimes used,
and applied to both true (malicious) malware and
unintentionally harmful software.
Spyware
Spyware is software that aims to gather
information about a person or organization
without their knowledge and that may send
such information to another entity without the
consumer’s consent, or that asserts control over
a computer without the consumer’s knowledge.
Trojan horse
A Trojan horse, or Trojan, in computing is any
malicious computer program which
misrepresents itself as useful, routine, or
interesting in order to persuade a victim to
install it. The term is derived from the Ancient
Greek story of the wooden horse that was used
to help Greek troops invade the city of Troy by
stealth.
• Anti Virus
• Fire wall
Anti Virus
Antivirus software was originally developed to
detect and remove computer viruses, hence the
name. However, with the proliferation of other
kinds of malware, antivirus software started to
provide protection from other computer threats.
Fire Wall
In computing, a firewall is a network security system that
monitors and controls the incoming and outgoing
network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted,
secure internal network and another outside network,
such as the Internet, that is assumed to not be secure or
trusted.
Computer virus
Computer virus

More Related Content

What's hot

Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
missstevenson01
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
JhumarieAcdan
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
TseAnRS
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
missstevenson01
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Malwares
MalwaresMalwares
Malwares
Claire Medolla
 
Malware
MalwareMalware
Surf smart
Surf smartSurf smart
Surf smart
-
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
Kanha Sahu
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
sravani ponnuru
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Internet threats
Internet threatsInternet threats
Internet threats
AngelicaMaliwat
 
Computer Security
Computer SecurityComputer Security
Computer Security
Danz Magdaraog
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
ianpoblete13
 
Vinay
VinayVinay
computer viruses
computer virusescomputer viruses
computer viruses
dayasunny7
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
Ali Asghar Jafari Lari
 

What's hot (19)

Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
MALWARE
MALWAREMALWARE
MALWARE
 
Malwares
MalwaresMalwares
Malwares
 
Malware
MalwareMalware
Malware
 
Surf smart
Surf smartSurf smart
Surf smart
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Computersecurity
ComputersecurityComputersecurity
Computersecurity
 
Internet threat
Internet threatInternet threat
Internet threat
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2A Trip to ICT and Society Series 1 : INFECTED! PART 2
A Trip to ICT and Society Series 1 : INFECTED! PART 2
 
Vinay
VinayVinay
Vinay
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 

Viewers also liked

January second week at school
January second week at schoolJanuary second week at school
January second week at school
aswathias
 
February 1st week
February 1st weekFebruary 1st week
February 1st week
aswathias
 
Awareness class on adolescent issues
Awareness class on adolescent issuesAwareness class on adolescent issues
Awareness class on adolescent issues
aswathias
 
Third week at school
Third week at schoolThird week at school
Third week at school
aswathias
 
January 4th week at school
January 4th week at schoolJanuary 4th week at school
January 4th week at school
aswathias
 
Fourth week at school
Fourth week at schoolFourth week at school
Fourth week at school
aswathias
 
First week at school
First week at schoolFirst week at school
First week at school
aswathias
 
Jan 1st week
Jan 1st weekJan 1st week
Jan 1st week
aswathias
 
January third week
January third weekJanuary third week
January third week
aswathias
 
seminar on psychology
seminar on psychologyseminar on psychology
seminar on psychology
teenzzzzz
 
Ppt presentn 2
Ppt presentn 2Ppt presentn 2
Ppt presentn 2
teenzzzzz
 

Viewers also liked (11)

January second week at school
January second week at schoolJanuary second week at school
January second week at school
 
February 1st week
February 1st weekFebruary 1st week
February 1st week
 
Awareness class on adolescent issues
Awareness class on adolescent issuesAwareness class on adolescent issues
Awareness class on adolescent issues
 
Third week at school
Third week at schoolThird week at school
Third week at school
 
January 4th week at school
January 4th week at schoolJanuary 4th week at school
January 4th week at school
 
Fourth week at school
Fourth week at schoolFourth week at school
Fourth week at school
 
First week at school
First week at schoolFirst week at school
First week at school
 
Jan 1st week
Jan 1st weekJan 1st week
Jan 1st week
 
January third week
January third weekJanuary third week
January third week
 
seminar on psychology
seminar on psychologyseminar on psychology
seminar on psychology
 
Ppt presentn 2
Ppt presentn 2Ppt presentn 2
Ppt presentn 2
 

Similar to Computer virus

All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
Kriti kohli
 
Malware
MalwareMalware
Malware
Avani Patel
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
Jerry Reyes
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
itsamuamit11
 
A trip to ict and society
A trip to ict and societyA trip to ict and society
A trip to ict and society
ianpoblete13
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
Osama Ghandour Geris
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
Mar Soriano
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
itsamuamit11
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Computer Crime & Security about computer
Computer Crime & Security about computerComputer Crime & Security about computer
Computer Crime & Security about computer
usmanahmadawan
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTSCYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
AzharShaikh408054
 
Cmp 3204 p a [2019-0553]
Cmp 3204 p a [2019-0553]Cmp 3204 p a [2019-0553]
Cmp 3204 p a [2019-0553]
TakatsoLetsie
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
Avinash627658
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
vasanthimuniasamy
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
loriefe barroga
 
Malware
MalwareMalware

Similar to Computer virus (20)

All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Demonstration Presentation
Demonstration PresentationDemonstration Presentation
Demonstration Presentation
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
A trip to ict and society
A trip to ict and societyA trip to ict and society
A trip to ict and society
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
Top 5 Omuter
Top 5 Omuter Top 5 Omuter
Top 5 Omuter
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer Crime & Security about computer
Computer Crime & Security about computerComputer Crime & Security about computer
Computer Crime & Security about computer
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTSCYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
CYBER SECURITY FOR SCHOOL AND JUNIOR COLLEGE STUDENTS
 
Cmp 3204 p a [2019-0553]
Cmp 3204 p a [2019-0553]Cmp 3204 p a [2019-0553]
Cmp 3204 p a [2019-0553]
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware
MalwareMalware
Malware
 

Recently uploaded

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 

Recently uploaded (20)

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 

Computer virus

  • 2. Computer Virus • Malware • Spyware • Trojan Horse
  • 3. Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software.
  • 4.
  • 5. Spyware Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer’s consent, or that asserts control over a computer without the consumer’s knowledge.
  • 6.
  • 7. Trojan horse A Trojan horse, or Trojan, in computing is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops invade the city of Troy by stealth.
  • 8.
  • 9. • Anti Virus • Fire wall
  • 10. Anti Virus Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats.
  • 11.
  • 12. Fire Wall In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed to not be secure or trusted.