SlideShare a Scribd company logo
1 of 15
Computer virus & Its Prevention
By- Pragati Kachhi(Assistant Professor
at Baba Saheb Ambedkar University
under department KMRO )
UGC-NET Qualified
CTET Qualified
AWES Qualified
MP-TET Qualified
Content :-
1. Computer virus
2. Types of virus
3. How to prevent computer from virus
4. Antivirus & types
A computer virus is a type of computer program that, when
executed, replicates itself by modifying other computer
programs and inserting its own code.
If this replication succeeds, the affected areas are then said
to be "infected" with a computer virus, a metaphor derived
from biological viruses.
A computer virus is a type of malicious software, or
malware, that spreads between computers and
causes damage to data and software. Computer viruses
aim to disrupt systems, cause major operational issues,
and result in data loss and leakage.
What is computer virus :-
Symptoms
1. The hard disk run out it space .
2. The computer does not boot.
3. Computer system becomes slow.
4. Display unwanted massage.
Prevention:-
1. Do not share drive C without password and without read only restriction.
2. Use antivirus & delete all email attachment.
3. Have multiple backup of files
4. Use more secure operating system ex. Unix /Linux .
How Does Virus Affect?
•By downloading files from the Internet.
•During the removable of media or drives.
•Through pen drive.
•Through e-mail attachments.
•Through unpatched software & services.
•Through unprotected or poor administrator
passwords.
5 Common Ways of Getting a Computer Virus
•Opening Links in Emails from Unknown Senders. This is
probably the most effective way of disseminating malware.
...
•Downloading Malware from Untrustworthy Sites. ...
•Clicking Online Ads. ...
•Social Media Scams. ...
•Software that Hasn't Been Patched Properly.
Types of Virus:-
 Worms
This is a computerprogram that replicates itself at a swift pace.
Unlikea computer virus, it is self-contained and hencedoes not need to be part of another program to propagate itself.
 Trojan Horse
A TrojanHorse is also a sort of destructive program that remains disguised ina normalsoftware program.
It is not exactly a virus, as it cannotreplicate itself. However, thereis possibility that virus program may remainconcealed in theTrojan Horse.
 Bombs
Itis similar to Trojan Horse, but Logic bombs havesome specialty; these include a timing device andhenceit will go off only at a particular date and time.
 Browser Hijacker
Easily detected, this virus type infects your browser and redirects you to malicious websites.
 . Web Scripting Virus
This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems
when users download malicious files or visit malicious websites.
What is malware?
Malware is an umbrella term for any piece of software that has malicious intent.
There are several types of malware and each of them has a unique way of infiltrating your computer which may include attempts at
gaining unauthorized control of your computer systems, stealing your personal information, encrypting your important files, or causing
other harm to your computers.
Sometimes the damage can be irrevocable.
Where does malware come from?
Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks.
Phishing – Emails can be disguised to be coming from a fraudulent company for the sole purpose of getting you to reveal personal
getting you to reveal personal information.
Malicious Websites – Some websites may attempt to install malware onto your computer, usually through popups or malicious links.
through popups or malicious links.
Torrents – Files shared through BitTorrents are generally unsafe because you never know what to expect until they’re downloaded.
expect until they’re downloaded.
Shared Networks – A malware-infected computer on the same shared network may spread malware onto your computer
onto your computer
Types Of Virus
Here’s a list of the common types of malware and their malicious intent:-
1. Trojans:-
A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious
2. Spyware:-
Spyware invades your computer and attempts to steal your personal information such as credit card or banking information, web
accounts.
3. Adware
Adware is unwanted software that displays advertisements on your screen. Adware collects personal information from you to
4. Rootkits
Rootkits enable unauthorized users to gain access to your computer without being detected.
5. Ransomware
Ransomware is designed to encrypt your files and block access to them until a ransom is paid.
6. Worms
A worm replicates itself by infecting other computers that are on the same network. They’re designed to consume bandwidth and
7. Keyloggers
Keyloggers keep track of your keystrokes on your keyboard and record them on a log. This information is used to gain
Impact of Virus:-
Let us now see the impact of virus on yourcomputer system −
•Disrupts thenormal functionalityof respective computer system.
•Disrupts system network use.
•Modifies configuration setting of the system.
•Destructs data.
•Disrupts computernetwork resources.
•Destructs of confidential data.
Virus Detection:-
The most fundamental method of detection of virus is to check the functionality of your computer system; a virus
affected computer does not take command properly.
However, if there is antivirus software in your computer system, then it can easily check programs and files on a
system for virus signatures.
 Virus Preventive Measures:-
 Installation of an effective antivirus software.
 Patching up the operating system.
 Patching up theclient software.
 Putting highlysecured Passwords.
 Useof Firewalls.
 Most Effective Antivirus:-
 McAfeeAntivirus Plus
 SymantecNortonAntivirus
 Avast Pro Antivirus
 Bitdefender Antivirus Plus
 Kaspersky Anti-Virus
 Avira Antivirus
 Webroot SecureAnywhereAntivirus
 Emsisoft Anti-Malware
 QuickHeal Antivirus
 ESET NOD32Antivirus
Antivirus software is a set of programs that can prevent, detect, remove, and search for different
viruses or other malware software like worms, trojan, adware, etc.
Basically, the computer devices use this software but, it also works on networks and IT systems.
Net Protector Total Security:-
Net Protector defends your Office Network from all viruses,
worm and spyware attacks and keeps your business lifeline,
Network and PCs, running smoothly and securely.
Total Security
Net Protector Total Security provides you multilayered
protection. Ensures smooth, fast internet connection and
surfing. Reduces Unwanted Traffic.
Real-time Protection stops the viruses before they reach your
Personal Computer, keeping your Applications and Data safe.
Complete security solution for home users.
Antivirus
Antivirus & Anti-Malware
Multilayered protection against all types of viruses.
Behavior Heuristic Control
Detects & Blocks Ransomware actions in the system with different heuristic rules.
Ransomware LAN Shield
Protects data in the system, even if the infection is originated at some other endpoints in the network.
Firewall
Monitors & blocks all malicious incoming & outgoing internet connections.
Data Backup
Automatically, backups your recently edited Documents for safe keeping against any corruption or ransomware.
Anti-phishing
Blocks fraudulent bank look-alike pages & login credential stealing links.
Advertise Blocker
Protects from malicious Adware & saves internet bandwidth, CPU, Memory.
Anti-Ransomware Shield
Blocks new, unknown Ransomware which corrupt & encrypt data files.
Automatic Updates
Updates antivirus in the background automatically every hour as connected to internet.
Parental Control
Ensure appropriate and safe usage of Internet, applications and
devices for your child through NPAV's Parental Control.
By getting a Norton® Secured Seal, you get a scheduled
Symantec® Malware Scan daily, which automatically
shields the site from any chance of getting infected by
malicious software.
Norton AntiVirus Plus enables you to scan your
computer for malware, spyware, ransomware, and
viruses. It offers a Quick Scan option or a comprehensive
Full System Scan, as well as the ability to scan custom
locations to find and remove threats.
Website :-
https://us.norton.com/blog/malware/what-is-antivirus
Antivirus software helps protect your computer against
malware and cybercriminals. Antivirus software looks at
data — web pages, files, software, applications —
traveling over the network to your devices. It searches for
known threats and monitors the behavior of all programs,
flagging suspicious behavior. It seeks to block or remove
malware as quickly as possible.
For more notes lets connect on YouTube

More Related Content

What's hot (20)

SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Malware
MalwareMalware
Malware
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt123
Ppt123Ppt123
Ppt123
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 

Similar to Computer Virus ppt.pptx

Similar to Computer Virus ppt.pptx (20)

Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Malicious
MaliciousMalicious
Malicious
 
computer security
computer securitycomputer security
computer security
 
presentation on Virus
presentation on Viruspresentation on Virus
presentation on Virus
 
How to protect pc against Malware
How to protect pc against MalwareHow to protect pc against Malware
How to protect pc against Malware
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Presentation2
Presentation2Presentation2
Presentation2
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 

More from PragatiKachhi1

Educational Psychology B.ED 1 sem..pptx
Educational Psychology B.ED 1 sem..pptxEducational Psychology B.ED 1 sem..pptx
Educational Psychology B.ED 1 sem..pptxPragatiKachhi1
 
Topic -Anatomy of Computer.pptx
Topic -Anatomy  of Computer.pptxTopic -Anatomy  of Computer.pptx
Topic -Anatomy of Computer.pptxPragatiKachhi1
 
CH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxCH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxPragatiKachhi1
 
basics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptbasics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptPragatiKachhi1
 
guidance& counseling Unit 2& 3.pptx
guidance& counseling Unit 2& 3.pptxguidance& counseling Unit 2& 3.pptx
guidance& counseling Unit 2& 3.pptxPragatiKachhi1
 
counselling notes.pptx
counselling notes.pptxcounselling notes.pptx
counselling notes.pptxPragatiKachhi1
 
all about content writing.pptx
all about content writing.pptxall about content writing.pptx
all about content writing.pptxPragatiKachhi1
 
strategies for helping exceptional children to overcome their problem ppt.pptx
strategies for helping exceptional children to overcome their problem ppt.pptxstrategies for helping exceptional children to overcome their problem ppt.pptx
strategies for helping exceptional children to overcome their problem ppt.pptxPragatiKachhi1
 
exceptional children ppt.pptx
exceptional children ppt.pptxexceptional children ppt.pptx
exceptional children ppt.pptxPragatiKachhi1
 
inclusive education .pptx
 inclusive education .pptx inclusive education .pptx
inclusive education .pptxPragatiKachhi1
 
PEER ASSESSMENT inclusive school.pptx
PEER ASSESSMENT inclusive school.pptxPEER ASSESSMENT inclusive school.pptx
PEER ASSESSMENT inclusive school.pptxPragatiKachhi1
 
INCLUSIVE SCHOOLS ppt.pptx
INCLUSIVE SCHOOLS ppt.pptxINCLUSIVE SCHOOLS ppt.pptx
INCLUSIVE SCHOOLS ppt.pptxPragatiKachhi1
 
Presentation on the topic of social website ( B.ed 4 semester).pptx
Presentation on the topic of social website ( B.ed 4 semester).pptxPresentation on the topic of social website ( B.ed 4 semester).pptx
Presentation on the topic of social website ( B.ed 4 semester).pptxPragatiKachhi1
 

More from PragatiKachhi1 (17)

swyam ppt.pptx
swyam ppt.pptxswyam ppt.pptx
swyam ppt.pptx
 
Educational Psychology B.ED 1 sem..pptx
Educational Psychology B.ED 1 sem..pptxEducational Psychology B.ED 1 sem..pptx
Educational Psychology B.ED 1 sem..pptx
 
Topic -Anatomy of Computer.pptx
Topic -Anatomy  of Computer.pptxTopic -Anatomy  of Computer.pptx
Topic -Anatomy of Computer.pptx
 
out put devices.pptx
out put devices.pptxout put devices.pptx
out put devices.pptx
 
CH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptxCH - 4 central processing unit & memory devices.pptx
CH - 4 central processing unit & memory devices.pptx
 
basics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptbasics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).ppt
 
guidance& counseling Unit 2& 3.pptx
guidance& counseling Unit 2& 3.pptxguidance& counseling Unit 2& 3.pptx
guidance& counseling Unit 2& 3.pptx
 
counselling notes.pptx
counselling notes.pptxcounselling notes.pptx
counselling notes.pptx
 
all about content writing.pptx
all about content writing.pptxall about content writing.pptx
all about content writing.pptx
 
strategies for helping exceptional children to overcome their problem ppt.pptx
strategies for helping exceptional children to overcome their problem ppt.pptxstrategies for helping exceptional children to overcome their problem ppt.pptx
strategies for helping exceptional children to overcome their problem ppt.pptx
 
exceptional children ppt.pptx
exceptional children ppt.pptxexceptional children ppt.pptx
exceptional children ppt.pptx
 
guidance notes.pptx
guidance notes.pptxguidance notes.pptx
guidance notes.pptx
 
inclusive education .pptx
 inclusive education .pptx inclusive education .pptx
inclusive education .pptx
 
PEER ASSESSMENT inclusive school.pptx
PEER ASSESSMENT inclusive school.pptxPEER ASSESSMENT inclusive school.pptx
PEER ASSESSMENT inclusive school.pptx
 
INCLUSIVE SCHOOLS ppt.pptx
INCLUSIVE SCHOOLS ppt.pptxINCLUSIVE SCHOOLS ppt.pptx
INCLUSIVE SCHOOLS ppt.pptx
 
All About an IPO.pptx
All About an IPO.pptxAll About an IPO.pptx
All About an IPO.pptx
 
Presentation on the topic of social website ( B.ed 4 semester).pptx
Presentation on the topic of social website ( B.ed 4 semester).pptxPresentation on the topic of social website ( B.ed 4 semester).pptx
Presentation on the topic of social website ( B.ed 4 semester).pptx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Computer Virus ppt.pptx

  • 1. Computer virus & Its Prevention By- Pragati Kachhi(Assistant Professor at Baba Saheb Ambedkar University under department KMRO ) UGC-NET Qualified CTET Qualified AWES Qualified MP-TET Qualified Content :- 1. Computer virus 2. Types of virus 3. How to prevent computer from virus 4. Antivirus & types
  • 2. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. What is computer virus :-
  • 3. Symptoms 1. The hard disk run out it space . 2. The computer does not boot. 3. Computer system becomes slow. 4. Display unwanted massage. Prevention:- 1. Do not share drive C without password and without read only restriction. 2. Use antivirus & delete all email attachment. 3. Have multiple backup of files 4. Use more secure operating system ex. Unix /Linux .
  • 4. How Does Virus Affect? •By downloading files from the Internet. •During the removable of media or drives. •Through pen drive. •Through e-mail attachments. •Through unpatched software & services. •Through unprotected or poor administrator passwords. 5 Common Ways of Getting a Computer Virus •Opening Links in Emails from Unknown Senders. This is probably the most effective way of disseminating malware. ... •Downloading Malware from Untrustworthy Sites. ... •Clicking Online Ads. ... •Social Media Scams. ... •Software that Hasn't Been Patched Properly.
  • 5. Types of Virus:-  Worms This is a computerprogram that replicates itself at a swift pace. Unlikea computer virus, it is self-contained and hencedoes not need to be part of another program to propagate itself.  Trojan Horse A TrojanHorse is also a sort of destructive program that remains disguised ina normalsoftware program. It is not exactly a virus, as it cannotreplicate itself. However, thereis possibility that virus program may remainconcealed in theTrojan Horse.  Bombs Itis similar to Trojan Horse, but Logic bombs havesome specialty; these include a timing device andhenceit will go off only at a particular date and time.  Browser Hijacker Easily detected, this virus type infects your browser and redirects you to malicious websites.  . Web Scripting Virus This sneaky virus disguises itself in the coding of links, ads, images, videos, and site code. It can infect systems when users download malicious files or visit malicious websites.
  • 6.
  • 7. What is malware? Malware is an umbrella term for any piece of software that has malicious intent. There are several types of malware and each of them has a unique way of infiltrating your computer which may include attempts at gaining unauthorized control of your computer systems, stealing your personal information, encrypting your important files, or causing other harm to your computers. Sometimes the damage can be irrevocable. Where does malware come from? Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks. Phishing – Emails can be disguised to be coming from a fraudulent company for the sole purpose of getting you to reveal personal getting you to reveal personal information. Malicious Websites – Some websites may attempt to install malware onto your computer, usually through popups or malicious links. through popups or malicious links. Torrents – Files shared through BitTorrents are generally unsafe because you never know what to expect until they’re downloaded. expect until they’re downloaded. Shared Networks – A malware-infected computer on the same shared network may spread malware onto your computer onto your computer
  • 9. Here’s a list of the common types of malware and their malicious intent:- 1. Trojans:- A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of tricking you into executing malicious 2. Spyware:- Spyware invades your computer and attempts to steal your personal information such as credit card or banking information, web accounts. 3. Adware Adware is unwanted software that displays advertisements on your screen. Adware collects personal information from you to 4. Rootkits Rootkits enable unauthorized users to gain access to your computer without being detected. 5. Ransomware Ransomware is designed to encrypt your files and block access to them until a ransom is paid. 6. Worms A worm replicates itself by infecting other computers that are on the same network. They’re designed to consume bandwidth and 7. Keyloggers Keyloggers keep track of your keystrokes on your keyboard and record them on a log. This information is used to gain
  • 10. Impact of Virus:- Let us now see the impact of virus on yourcomputer system − •Disrupts thenormal functionalityof respective computer system. •Disrupts system network use. •Modifies configuration setting of the system. •Destructs data. •Disrupts computernetwork resources. •Destructs of confidential data. Virus Detection:- The most fundamental method of detection of virus is to check the functionality of your computer system; a virus affected computer does not take command properly. However, if there is antivirus software in your computer system, then it can easily check programs and files on a system for virus signatures.
  • 11.  Virus Preventive Measures:-  Installation of an effective antivirus software.  Patching up the operating system.  Patching up theclient software.  Putting highlysecured Passwords.  Useof Firewalls.  Most Effective Antivirus:-  McAfeeAntivirus Plus  SymantecNortonAntivirus  Avast Pro Antivirus  Bitdefender Antivirus Plus  Kaspersky Anti-Virus  Avira Antivirus  Webroot SecureAnywhereAntivirus  Emsisoft Anti-Malware  QuickHeal Antivirus  ESET NOD32Antivirus
  • 12. Antivirus software is a set of programs that can prevent, detect, remove, and search for different viruses or other malware software like worms, trojan, adware, etc. Basically, the computer devices use this software but, it also works on networks and IT systems. Net Protector Total Security:- Net Protector defends your Office Network from all viruses, worm and spyware attacks and keeps your business lifeline, Network and PCs, running smoothly and securely. Total Security Net Protector Total Security provides you multilayered protection. Ensures smooth, fast internet connection and surfing. Reduces Unwanted Traffic. Real-time Protection stops the viruses before they reach your Personal Computer, keeping your Applications and Data safe. Complete security solution for home users. Antivirus
  • 13. Antivirus & Anti-Malware Multilayered protection against all types of viruses. Behavior Heuristic Control Detects & Blocks Ransomware actions in the system with different heuristic rules. Ransomware LAN Shield Protects data in the system, even if the infection is originated at some other endpoints in the network. Firewall Monitors & blocks all malicious incoming & outgoing internet connections. Data Backup Automatically, backups your recently edited Documents for safe keeping against any corruption or ransomware. Anti-phishing Blocks fraudulent bank look-alike pages & login credential stealing links. Advertise Blocker Protects from malicious Adware & saves internet bandwidth, CPU, Memory. Anti-Ransomware Shield Blocks new, unknown Ransomware which corrupt & encrypt data files. Automatic Updates Updates antivirus in the background automatically every hour as connected to internet. Parental Control Ensure appropriate and safe usage of Internet, applications and devices for your child through NPAV's Parental Control.
  • 14. By getting a Norton® Secured Seal, you get a scheduled Symantec® Malware Scan daily, which automatically shields the site from any chance of getting infected by malicious software. Norton AntiVirus Plus enables you to scan your computer for malware, spyware, ransomware, and viruses. It offers a Quick Scan option or a comprehensive Full System Scan, as well as the ability to scan custom locations to find and remove threats. Website :- https://us.norton.com/blog/malware/what-is-antivirus Antivirus software helps protect your computer against malware and cybercriminals. Antivirus software looks at data — web pages, files, software, applications — traveling over the network to your devices. It searches for known threats and monitors the behavior of all programs, flagging suspicious behavior. It seeks to block or remove malware as quickly as possible.
  • 15. For more notes lets connect on YouTube