SlideShare a Scribd company logo
1 of 8
COMPUTER VIRUS
BY: DIKSHYANTA DHUNGANA
TO: PRABIN DAHAL
INTRODUCTION ON
COMPUTER SECURITY
• Malicious code which replicates by copying itself to
another program.
• It change computer performance.
• Required permission of user to spread.
• Worm is a stand alone programming which don’t
require any hosting
• Both virus and worn are referred as malware.
SOME FAMOUS VIRUS
• I love you virus is one of the most well-known and destructive
virus of all time which used same style of Melissa virus.
• Cryptolocker is also on of the most popular malware which is
attached with email and encrypted the file so user cant access
them.
• MyDoom spammed junk mail through infected computers, with
text that said ” Andy I’m just doing my job, sorry nothing
personal.
• Many others famous virus are there some are: Slammer, Anna
Kournikova, Stuxnet
TYPES OF VIRUS
• Trojan Horse: It is a program that causes unexpected effects when willing installed or run by an
unsuspecting user. It is generally deeply buried in the code of the target program and lie dormant for
specified period. It is also useful program but inside it crash the computer, download third party
application and delete files and folders.
• Virus: Virus is a code segment, which replicates by attaching copies to existing executables. Viruses
are currently designed to attack single platforms. A platform is defined as the combination of
hardware.
• Worm: A “worm” is a program that travels independently along computer cables. It spread copies of
itself through a network. Most computers are connected via cabling, so these can do a lot of damage
in a short time.
• Trapdoors: A trapdoor is a secret, undocumented entry point into a module. In other words, it is a
feature in a program by which someone can access the program other than by obvious, direct call,
perhaps with special privileges.
• Logic Bomb: A “logic bomb” is a program that sits on your computer and does nothing, until…. The
‘until’ could be pressing a key, like the ESC key.
HOW DOES VIRUS FIND VICTIM?
• Sharing music, files or photos with other users.
• Visiting an infected Web site.
• Opening spam email or an email attachment.
• Downloading free games, toolbars, media players and other
system utilities.
• Installing mainstream software applications without fully
reading license agreements.
WHY VIRUS ARE CREATED ?
• For money
• For revenge
• An Ego
• Stealth
SYMPTOMS OF COMPUTER
VIRUS
• Slow performance
• Erratic computer behavior
• Unexplained data loss
• Frequent computer crashes
PROTECTION FROM VIRUS
• Don’t open messages from unknown senders.
• Delete the message you suspects to be spam.
• Update OS regularly
• Increase browser security setting
• Get antispyware software
• Only download from trusted sites.

More Related Content

What's hot

What's hot (20)

As computer virus
As computer virusAs computer virus
As computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
Virus  Virus
Virus
 
The Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer VirusesThe Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer Viruses
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Avoiding email viruses
Avoiding email virusesAvoiding email viruses
Avoiding email viruses
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Computer virus
Computer virusComputer virus
Computer virus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 

Similar to Computer virus guide: Types, symptoms & protection

Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threatAzri Abdin
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 

Similar to Computer virus guide: Types, symptoms & protection (20)

Malicious
MaliciousMalicious
Malicious
 
Malwares
MalwaresMalwares
Malwares
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Senior Education
Senior EducationSenior Education
Senior Education
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 

More from Dikshyanta Dhungana (9)

Punctuation
PunctuationPunctuation
Punctuation
 
Heuristic evaluation
Heuristic evaluationHeuristic evaluation
Heuristic evaluation
 
Building learning organization
Building learning organizationBuilding learning organization
Building learning organization
 
Daily stand up meeting
Daily stand up meetingDaily stand up meeting
Daily stand up meeting
 
Stlc and v model
Stlc and v modelStlc and v model
Stlc and v model
 
Agile manifesto
Agile manifestoAgile manifesto
Agile manifesto
 
Functional and non functional
Functional and non functionalFunctional and non functional
Functional and non functional
 
Access modifier and inheritance
Access modifier and inheritanceAccess modifier and inheritance
Access modifier and inheritance
 
Autodesk maya
Autodesk mayaAutodesk maya
Autodesk maya
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Computer virus guide: Types, symptoms & protection

  • 1. COMPUTER VIRUS BY: DIKSHYANTA DHUNGANA TO: PRABIN DAHAL
  • 2. INTRODUCTION ON COMPUTER SECURITY • Malicious code which replicates by copying itself to another program. • It change computer performance. • Required permission of user to spread. • Worm is a stand alone programming which don’t require any hosting • Both virus and worn are referred as malware.
  • 3. SOME FAMOUS VIRUS • I love you virus is one of the most well-known and destructive virus of all time which used same style of Melissa virus. • Cryptolocker is also on of the most popular malware which is attached with email and encrypted the file so user cant access them. • MyDoom spammed junk mail through infected computers, with text that said ” Andy I’m just doing my job, sorry nothing personal. • Many others famous virus are there some are: Slammer, Anna Kournikova, Stuxnet
  • 4. TYPES OF VIRUS • Trojan Horse: It is a program that causes unexpected effects when willing installed or run by an unsuspecting user. It is generally deeply buried in the code of the target program and lie dormant for specified period. It is also useful program but inside it crash the computer, download third party application and delete files and folders. • Virus: Virus is a code segment, which replicates by attaching copies to existing executables. Viruses are currently designed to attack single platforms. A platform is defined as the combination of hardware. • Worm: A “worm” is a program that travels independently along computer cables. It spread copies of itself through a network. Most computers are connected via cabling, so these can do a lot of damage in a short time. • Trapdoors: A trapdoor is a secret, undocumented entry point into a module. In other words, it is a feature in a program by which someone can access the program other than by obvious, direct call, perhaps with special privileges. • Logic Bomb: A “logic bomb” is a program that sits on your computer and does nothing, until…. The ‘until’ could be pressing a key, like the ESC key.
  • 5. HOW DOES VIRUS FIND VICTIM? • Sharing music, files or photos with other users. • Visiting an infected Web site. • Opening spam email or an email attachment. • Downloading free games, toolbars, media players and other system utilities. • Installing mainstream software applications without fully reading license agreements.
  • 6. WHY VIRUS ARE CREATED ? • For money • For revenge • An Ego • Stealth
  • 7. SYMPTOMS OF COMPUTER VIRUS • Slow performance • Erratic computer behavior • Unexplained data loss • Frequent computer crashes
  • 8. PROTECTION FROM VIRUS • Don’t open messages from unknown senders. • Delete the message you suspects to be spam. • Update OS regularly • Increase browser security setting • Get antispyware software • Only download from trusted sites.

Editor's Notes

  1. I love you virus came in an email subject line that said “I Love You”. So by curious people click on email but the email was not from anyone they knew. Guinness book of world record as the most ‘Virulent’ virus of all time. Still I love you virus is popular still people click on it. Was introduce in 2000 To decrypt the file hacker ask sum of money from the user. Some system restore and recovery software work on it. So it suggest people to make back up of the files. Over 500000 people were victim of this virus. It was also record holder virus like I love you its main target was tech companies. Over 16-25% of email were infected from MyDoom.