SlideShare a Scribd company logo
SUBMITTED TO –
VINEET KATHURIA
SUBMITTED BY –
SHUBHAM VERMA
97 ITT BATCH
REG. NO. –
CRO0564909
WHAT IS COMPUTER VIRUS?
• Computer viruses are a type of software program that, like a
biological virus, reproduces and spreads itself
• Some virus may display only a message on the screen, others may
slow down the Pc
• They can also erase files or even format your floppy or hard disk
and crash the system.
WHO CREATES/WRITES VIRUSES ?
INFO ATTACKERS PROFIT EARNER
 VIRUS / ANTIVIRUS
MARKET
 PSYCHO CASES
 FOR FUN
 TO TAKE REVENG
 RELEASE ANGER
TYPE OF VIRUSES
• There are about millions of viruses present & daily 6 to 7 new viruses
are found
• The following are some types of viruses:
Boot sector Virus Program/ File Infector
Trojan Horses Worms, Macro Virus
Polymorphic Virus Companion Virus
FAT Virus Logic Bombs
Spyware Adware
Multipartite virus Stealth virus etc.
MAJOR TYPES OF VIRUSES
VIRUS
Worms
Program/
File
Infector
Macro
Viruses
Trojan
Horses
Boot
Sector
Virus
BOOT SECTOR VIRUS
•The boot Sector virus affects the
booting process of the infected
computer system, thus causing slow
start up and shut down process
PROGRAM / FILE INFECTOR VIRUS
• Becomes active when the
program file carrying the virus is
opened.
• A file-infecting virus overwrites
code or inserts infected code into
a executable file
• usually with below extensions
.BIN .COM
.EXE .OVL
.DRV
WORMS
• A computer worm is a self-replicating computer program.
• It uses a network to send copies of itself to other nodes
(computer terminals on the network) and it may do so without
any user intervention.
• Unlike a virus, it does not need to attach itself to an existing
program. Worms always harm the network (if only by
consuming bandwidth), whereas viruses always infect or
corrupt files on a targeted computer.
Worm Propagation
Leverage: Network Connectivity
MACRO VIRUS
• These type of virus
infects word , excel,
PowerPoint, access
and other data files.
Once infected
repairing of these files
is very much difficult.
TROJAN HORSES
•A Trojan horse is a program that unlike a
virus contains or installs a malicious program
(sometimes called the payload or 'trojan').
• The term is derived from the classical myth
of the Trojan Horse.
• Trojan horses may appear to be useful or
interesting programs to an unsuspecting user,
but are actually harmful when executed.
• The famous usage in hacking.
TROJAN
SOME EXAMPLES OF VIRUSES
Boot Sector Virus
Form
Disk Killer
Michelangelo
Stone virus
 Program / File Infector Virus
 Cascade
 Sunday
 Worms
 ILOVEYOU
 Code Red
 Melissa
 Storm Worm
 Macro Virus
 DMV
 Nuclear
 Word Concept
 Melissa Worm.
 Trojan Horses
 Vundo
 Zeus Trojan
THE FUNCTIONAL LOGIC OF A VIRUS
 Search for a file to infect.
 Open the file to see if it is infected.
 If infected, search for another file.
 Else, infect the file.
 Return control to the host program.
VIRUS
V
Virus – Needs a host
Virus Propagation
Leverage : User Connectivity
CAUSES AND EFFECTS OF COMPUTER
VIRUSES
• Computer viruses spread by attaching themselves to the other
computer program files(usually .exe, .com, .bat, .dll, )
• A computer virus may be hidden or protected from the users
eye
• These viruses spread through infected files in Floppy, Cd, Usb
pen drive & internet
• Computer viruses can infect the program and it may lead to loss of
important data
• These viruses are transfers to our data through any floppy or cd
• If any infected file is copy in your system then it will infect the other
files and function too
CURE OF COMPUTER VIRUSES
PREVENTION & CURE OF
COMPUTER VIRUSES
• Since virus can cause extensive effect to your important
files,possible steps must be take to prevent attack on your pc
• If you use floppy disk to boot your pc then write protect it
• Make backups of your impotent files in floppy or cd and keep
it in a safe place you will need it later
• Install an Antivirus software
• Regularly update the program
• Open email attachment files only if you are expecting the
attached files, or the sender is known and has confirmed
sending the file
• Try to avoid downloading and installing software from the
Internet
• Install only registered copies of software on the system
ANTI-VIRUS
WHAT IS AN ANTI-VIRUS?
• Anti-virus is a software (computer program)
that scans files or your computer's memory
for certain patterns that may indicate an
infection.
• The patterns it looks for are based on the
signatures, or fingerprints, of known viruses.
computer programs intended to Identify
and Eliminate Computer Viruses.
SOME ANTI-VIRUSES SOFTWARE
CONCLUSION
• I think we should not use the pc without any antivirus security
as it may cause damage to our important data
• Do not copy or transfer any data or file without scanning the
disk.
ANY QUESTIONS ?
Computer virus & its cure

More Related Content

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
 Computer virus Computer virus
Computer virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Malicious
MaliciousMalicious
Malicious
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time10 Worst Computer Viruses of all time
10 Worst Computer Viruses of all time
 
The Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer VirusesThe Giant Black Book Of Computer Viruses
The Giant Black Book Of Computer Viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 

Similar to Computer virus & its cure

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prezStudio Sheen
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their typesNeha Kurale
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 

Similar to Computer virus & its cure (20)

Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horsies prez
Trojan horsies prezTrojan horsies prez
Trojan horsies prez
 
information about virus
information about virusinformation about virus
information about virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 

Recently uploaded

Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerVladimir Samoylov
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesIP ServerOne
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFRahsaan L. Browne
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdfrajpreetkaur75080
 
Breathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptxBreathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptxFamilyWorshipCenterD
 
Introduction of Biology in living organisms
Introduction of Biology in living organismsIntroduction of Biology in living organisms
Introduction of Biology in living organismssoumyapottola
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfSkillCertProExams
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationAccess Innovations, Inc.
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22LHelferty
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptxgargh1099
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxShivamM16
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Rahsaan L. Browne
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community NetworkingMichael Orias
 

Recently uploaded (14)

Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
 
Breathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptxBreathing in New Life_ Part 3 05 22 2024.pptx
Breathing in New Life_ Part 3 05 22 2024.pptx
 
Introduction of Biology in living organisms
Introduction of Biology in living organismsIntroduction of Biology in living organisms
Introduction of Biology in living organisms
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
 

Computer virus & its cure

  • 1. SUBMITTED TO – VINEET KATHURIA SUBMITTED BY – SHUBHAM VERMA 97 ITT BATCH REG. NO. – CRO0564909
  • 2. WHAT IS COMPUTER VIRUS? • Computer viruses are a type of software program that, like a biological virus, reproduces and spreads itself • Some virus may display only a message on the screen, others may slow down the Pc • They can also erase files or even format your floppy or hard disk and crash the system.
  • 3. WHO CREATES/WRITES VIRUSES ? INFO ATTACKERS PROFIT EARNER  VIRUS / ANTIVIRUS MARKET  PSYCHO CASES  FOR FUN  TO TAKE REVENG  RELEASE ANGER
  • 4. TYPE OF VIRUSES • There are about millions of viruses present & daily 6 to 7 new viruses are found • The following are some types of viruses: Boot sector Virus Program/ File Infector Trojan Horses Worms, Macro Virus Polymorphic Virus Companion Virus FAT Virus Logic Bombs Spyware Adware Multipartite virus Stealth virus etc.
  • 5. MAJOR TYPES OF VIRUSES VIRUS Worms Program/ File Infector Macro Viruses Trojan Horses Boot Sector Virus
  • 6. BOOT SECTOR VIRUS •The boot Sector virus affects the booting process of the infected computer system, thus causing slow start up and shut down process
  • 7. PROGRAM / FILE INFECTOR VIRUS • Becomes active when the program file carrying the virus is opened. • A file-infecting virus overwrites code or inserts infected code into a executable file • usually with below extensions .BIN .COM .EXE .OVL .DRV
  • 8. WORMS • A computer worm is a self-replicating computer program. • It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
  • 10. MACRO VIRUS • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 11. TROJAN HORSES •A Trojan horse is a program that unlike a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). • The term is derived from the classical myth of the Trojan Horse. • Trojan horses may appear to be useful or interesting programs to an unsuspecting user, but are actually harmful when executed. • The famous usage in hacking.
  • 13. SOME EXAMPLES OF VIRUSES Boot Sector Virus Form Disk Killer Michelangelo Stone virus  Program / File Infector Virus  Cascade  Sunday  Worms  ILOVEYOU  Code Red  Melissa  Storm Worm  Macro Virus  DMV  Nuclear  Word Concept  Melissa Worm.  Trojan Horses  Vundo  Zeus Trojan
  • 14. THE FUNCTIONAL LOGIC OF A VIRUS  Search for a file to infect.  Open the file to see if it is infected.  If infected, search for another file.  Else, infect the file.  Return control to the host program.
  • 16. Virus Propagation Leverage : User Connectivity
  • 17. CAUSES AND EFFECTS OF COMPUTER VIRUSES • Computer viruses spread by attaching themselves to the other computer program files(usually .exe, .com, .bat, .dll, ) • A computer virus may be hidden or protected from the users eye • These viruses spread through infected files in Floppy, Cd, Usb pen drive & internet • Computer viruses can infect the program and it may lead to loss of important data • These viruses are transfers to our data through any floppy or cd • If any infected file is copy in your system then it will infect the other files and function too
  • 18. CURE OF COMPUTER VIRUSES
  • 19. PREVENTION & CURE OF COMPUTER VIRUSES • Since virus can cause extensive effect to your important files,possible steps must be take to prevent attack on your pc • If you use floppy disk to boot your pc then write protect it • Make backups of your impotent files in floppy or cd and keep it in a safe place you will need it later • Install an Antivirus software • Regularly update the program • Open email attachment files only if you are expecting the attached files, or the sender is known and has confirmed sending the file • Try to avoid downloading and installing software from the Internet • Install only registered copies of software on the system
  • 21. WHAT IS AN ANTI-VIRUS? • Anti-virus is a software (computer program) that scans files or your computer's memory for certain patterns that may indicate an infection. • The patterns it looks for are based on the signatures, or fingerprints, of known viruses. computer programs intended to Identify and Eliminate Computer Viruses.
  • 23. CONCLUSION • I think we should not use the pc without any antivirus security as it may cause damage to our important data • Do not copy or transfer any data or file without scanning the disk.
  • 24.