SlideShare a Scribd company logo
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
A computer virus is a caustic computer
program that can replicate itself and spread from
one computer to another without the permission of
the owner.




       © 2012 Charmaine S. Camilo. All rights
                   reserved.
Viruses




  Botnet                   Malware       Worms




                             Trojan
                             Horse

© 2012 Charmaine S. Camilo. All rights
            reserved.
•   Worms
•   Boot sector virus
•   File infection virus
•   Multipartite virus
•   Network virus
•   E-mail virus
•   Macro virus
•   Memory resident viruses
•   Root kit virus
•   Polymorphic viruses
•   Logic bombs/Time bombs


         © 2012 Charmaine S. Camilo. All rights
                     reserved.
The following are some possible indications
    that a computer has been infected by a virus.
    These problems can also be caused by non-virus
    problems, but they are the most reported
    symptoms of a computer virus infection.

•   Computer no longer boots up.
•   Screens sometimes flicker.
•   Computer runs slower then usual.
•   PC speaker beeps periodically.
•   System crashes for no reason.
•   Files/directories sometimes disappear.

         © 2012 Charmaine S. Camilo. All rights
                     reserved.
Virus writers have to balance how and when
  their viruses infect against the possibility of being
  detected. Therefore, the spread of an infection
  may not be immediate.

Phases of Viruses
• Infection phase
• Attack phase




        © 2012 Charmaine S. Camilo. All rights
                    reserved.
•   System Sectors/Boot Records
•   Files
•   Companion Files
•   Macros
•   Disk Clusters
•   Batch Files
•   Source Code
•   Visual Basic Worms




         © 2012 Charmaine S. Camilo. All rights
                     reserved.
1. Email attachments.
2. Rogue Websites.
3. Networks
4. Infected Boot Disks
5. Phishing Schemes
6. Infected Software
7. Hackers
8. Instant Messaging
9. Fake Anti Virus Software
10. From Mobile Devices
11. Friends and Relatives

        © 2012 Charmaine S. Camilo. All rights
                    reserved.
• Anti-virus software
• Scan your computer on a regular basis
• Update your anti-virus software on a regular basis
• Back-up
• Turn-off E-mail Preview
• Scan Removable disk
• Scan downloaded files
• Scan all e-mail attachments
• Beware of e-mail attachments from unknown
  sources
• Be alert!


        © 2012 Charmaine S. Camilo. All rights
                    reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.
© 2012 Charmaine S. Camilo. All rights
            reserved.

More Related Content

What's hot

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
ariifuddin
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Adware
AdwareAdware
Adware
Avani Patel
 
Internet threat
Internet threatInternet threat
Internet threat
ShekainaLiwanag1
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
Sourav Verma
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
Ranjeta Muniandy
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
ShouaQureshi
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Sowmya
SowmyaSowmya
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Internet threats
Internet threatsInternet threats
Internet threats
rhustysambile
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
Putta Keyboard
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 

What's hot (20)

Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Adware
AdwareAdware
Adware
 
Internet threat
Internet threatInternet threat
Internet threat
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Sowmya
SowmyaSowmya
Sowmya
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Computers Diseases
Computers DiseasesComputers Diseases
Computers Diseases
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 

Viewers also liked

Chapter 22
Chapter 22Chapter 22
Chapter 22
Charmaine Camilo
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
Charmaine Camilo
 
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Arvin Garing
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Charmaine Camilo
 
Chapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksChapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and Works
Joanna Rose Saculo
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
leahamper29
 
RIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADRIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROAD
Ton Mausisa
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
Lyceum of the Philippines University- Cavite
 
Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987
Charmaine Camilo
 
Article 2 Philippine Constitution
Article 2 Philippine ConstitutionArticle 2 Philippine Constitution
Article 2 Philippine Constitution
cristineyabes1
 
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Msphieebz Lazatin
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of Rights
Kostyk Elf
 
Introduction to WAN
Introduction to WANIntroduction to WAN
Introduction to WAN
Charmaine Camilo
 
Chapter 21-jpr
Chapter 21-jprChapter 21-jpr
Chapter 21-jpr
Ellehcim Nolbor
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga Filipina
RUEL VILLASIS
 
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanJose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Aenn Charelle
 
Rizal's Life in Dapitan
Rizal's Life in DapitanRizal's Life in Dapitan
Rizal's Life in Dapitan
quelz
 
Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan
Emilio Fer Villa
 
Socio5 13 la liga and exile in dapitan
Socio5   13 la liga and exile in dapitanSocio5   13 la liga and exile in dapitan
Socio5 13 la liga and exile in dapitan
Yvan Gumbao
 

Viewers also liked (20)

Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
Rizal Chapter 22: Exile in Dapitan (Gregorio F. Zaide)
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)
 
Chapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and WorksChapter 24 Rizal's Life and Works
Chapter 24 Rizal's Life and Works
 
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINARizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
Rizal chapter 21- THE SECOND HOMECOMING AND LA LIGA FILIPINA
 
RIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROADRIZAL CHAPTER 23 LAST TRIP ABROAD
RIZAL CHAPTER 23 LAST TRIP ABROAD
 
Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22Summary Bill or RIGHTS Article 3 Section 1-22
Summary Bill or RIGHTS Article 3 Section 1-22
 
Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987Introduction to Philippine Constitution 1987
Introduction to Philippine Constitution 1987
 
Article 2 Philippine Constitution
Article 2 Philippine ConstitutionArticle 2 Philippine Constitution
Article 2 Philippine Constitution
 
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
Rizal chapter22 Exile in Dapitan (Gregorio F. Zaide)
 
Article III Bill of Rights
Article III Bill of RightsArticle III Bill of Rights
Article III Bill of Rights
 
Introduction to WAN
Introduction to WANIntroduction to WAN
Introduction to WAN
 
Kabanata 25 rizal
Kabanata 25 rizalKabanata 25 rizal
Kabanata 25 rizal
 
Chapter 21-jpr
Chapter 21-jprChapter 21-jpr
Chapter 21-jpr
 
Chapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga FilipinaChapter 21- Second Homecoming andThe liga Filipina
Chapter 21- Second Homecoming andThe liga Filipina
 
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in DapitanJose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
Jose Rizal Life, Works and Writings: Chapter 22 Exile in Dapitan
 
Rizal's Life in Dapitan
Rizal's Life in DapitanRizal's Life in Dapitan
Rizal's Life in Dapitan
 
Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan Chapter 25 martyrdom at bagumbayan
Chapter 25 martyrdom at bagumbayan
 
Socio5 13 la liga and exile in dapitan
Socio5   13 la liga and exile in dapitanSocio5   13 la liga and exile in dapitan
Socio5 13 la liga and exile in dapitan
 

Similar to Computer Virus

NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
ChSheraz3
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
Bharati Vidyapeeth New Law College,Pune
 
Online reputation
Online reputationOnline reputation
Online reputation
Eslam Mohammed
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
ShouaQureshi
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
BbAOC
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
Noushin Ahson
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
CYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxCYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptx
narenr9
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
JenMorri
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
Mohd Harris Ahmad Jaal
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 

Similar to Computer Virus (20)

NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptxCYBER SECURITY AWARENESS MONTH.pptx
CYBER SECURITY AWARENESS MONTH.pptx
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

More from Charmaine Camilo

GMO - Genetically Modified Organisms
GMO - Genetically Modified OrganismsGMO - Genetically Modified Organisms
GMO - Genetically Modified Organisms
Charmaine Camilo
 
Prehistoric Weapons
Prehistoric WeaponsPrehistoric Weapons
Prehistoric Weapons
Charmaine Camilo
 
This I Promise You - NSYNC
This I Promise You - NSYNCThis I Promise You - NSYNC
This I Promise You - NSYNC
Charmaine Camilo
 
All About Ears
All About EarsAll About Ears
All About Ears
Charmaine Camilo
 
Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)
Charmaine Camilo
 
Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)
Charmaine Camilo
 
Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)
Charmaine Camilo
 
Barriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic CultureBarriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic Culture
Charmaine Camilo
 
Recommendations
RecommendationsRecommendations
Recommendations
Charmaine Camilo
 
Socioanthro report cellona
Socioanthro report cellonaSocioanthro report cellona
Socioanthro report cellona
Charmaine Camilo
 
Bridges
BridgesBridges
Growth of A Democratic Culture
Growth of A Democratic CultureGrowth of A Democratic Culture
Growth of A Democratic Culture
Charmaine Camilo
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
Charmaine Camilo
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
Charmaine Camilo
 
Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)
Charmaine Camilo
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
Charmaine Camilo
 

More from Charmaine Camilo (16)

GMO - Genetically Modified Organisms
GMO - Genetically Modified OrganismsGMO - Genetically Modified Organisms
GMO - Genetically Modified Organisms
 
Prehistoric Weapons
Prehistoric WeaponsPrehistoric Weapons
Prehistoric Weapons
 
This I Promise You - NSYNC
This I Promise You - NSYNCThis I Promise You - NSYNC
This I Promise You - NSYNC
 
All About Ears
All About EarsAll About Ears
All About Ears
 
Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)Philippine Constitution 1987 (Article 6)
Philippine Constitution 1987 (Article 6)
 
Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)Philippine Constitution 1987 (Article 4)
Philippine Constitution 1987 (Article 4)
 
Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)Philippine Constitution 1987 (Article 2)
Philippine Constitution 1987 (Article 2)
 
Barriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic CultureBarriers and Bridges to a Democratic Culture
Barriers and Bridges to a Democratic Culture
 
Recommendations
RecommendationsRecommendations
Recommendations
 
Socioanthro report cellona
Socioanthro report cellonaSocioanthro report cellona
Socioanthro report cellona
 
Bridges
BridgesBridges
Bridges
 
Growth of A Democratic Culture
Growth of A Democratic CultureGrowth of A Democratic Culture
Growth of A Democratic Culture
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)Chapter 16 and 17 in belgian brussels (new1)
Chapter 16 and 17 in belgian brussels (new1)
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 

Recently uploaded

Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 

Recently uploaded (20)

Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 

Computer Virus

  • 1. © 2012 Charmaine S. Camilo. All rights reserved.
  • 2. © 2012 Charmaine S. Camilo. All rights reserved.
  • 3. © 2012 Charmaine S. Camilo. All rights reserved.
  • 4. © 2012 Charmaine S. Camilo. All rights reserved.
  • 5. © 2012 Charmaine S. Camilo. All rights reserved.
  • 6. A computer virus is a caustic computer program that can replicate itself and spread from one computer to another without the permission of the owner. © 2012 Charmaine S. Camilo. All rights reserved.
  • 7. Viruses Botnet Malware Worms Trojan Horse © 2012 Charmaine S. Camilo. All rights reserved.
  • 8. Worms • Boot sector virus • File infection virus • Multipartite virus • Network virus • E-mail virus • Macro virus • Memory resident viruses • Root kit virus • Polymorphic viruses • Logic bombs/Time bombs © 2012 Charmaine S. Camilo. All rights reserved.
  • 9. The following are some possible indications that a computer has been infected by a virus. These problems can also be caused by non-virus problems, but they are the most reported symptoms of a computer virus infection. • Computer no longer boots up. • Screens sometimes flicker. • Computer runs slower then usual. • PC speaker beeps periodically. • System crashes for no reason. • Files/directories sometimes disappear. © 2012 Charmaine S. Camilo. All rights reserved.
  • 10. Virus writers have to balance how and when their viruses infect against the possibility of being detected. Therefore, the spread of an infection may not be immediate. Phases of Viruses • Infection phase • Attack phase © 2012 Charmaine S. Camilo. All rights reserved.
  • 11. System Sectors/Boot Records • Files • Companion Files • Macros • Disk Clusters • Batch Files • Source Code • Visual Basic Worms © 2012 Charmaine S. Camilo. All rights reserved.
  • 12. 1. Email attachments. 2. Rogue Websites. 3. Networks 4. Infected Boot Disks 5. Phishing Schemes 6. Infected Software 7. Hackers 8. Instant Messaging 9. Fake Anti Virus Software 10. From Mobile Devices 11. Friends and Relatives © 2012 Charmaine S. Camilo. All rights reserved.
  • 13. • Anti-virus software • Scan your computer on a regular basis • Update your anti-virus software on a regular basis • Back-up • Turn-off E-mail Preview • Scan Removable disk • Scan downloaded files • Scan all e-mail attachments • Beware of e-mail attachments from unknown sources • Be alert! © 2012 Charmaine S. Camilo. All rights reserved.
  • 14. © 2012 Charmaine S. Camilo. All rights reserved.
  • 15. © 2012 Charmaine S. Camilo. All rights reserved.