SlideShare a Scribd company logo
1 of 19
Computer Viruses
Done by  Youssef Bahaa
Al-Din Mahmoud
Grade  9 A
Under the supervision of 
Mr. Mohammed Salah
Omar
Introduction
• A computer virus is a computer program that can replicate
itself, and spread from one computer to another. The term
"virus" is also commonly, but erroneously, used to refer to
other types of malware, including but not limited to adware
and spyware programs that do not have a reproductive ability.
Malware includes computer viruses, computer
worms, ransom ware, Trojan horses, key loggers, most
rootkits, spyware, dishonest adware, malicious BHOs and
other malicious software.
Intoduction
• The majority of active malware threats are usually Trojans or
worms rather than viruses. Malware such as Trojan horses
and worms is sometimes confused with viruses, which are
technically different: a worm can exploit security
vulnerabilities to spread itself automatically to other
computers through networks, while a Trojan horse is a
program that appears harmless but hides malicious functions.
Introduction
• Worms and Trojan horses, like viruses, may harm a computer
system's data or performance. Some viruses and other
malware have symptoms noticeable to the computer user, but
many are surreptitious or simply do nothing to call attention
to themselves. Some viruses do nothing beyond reproducing
themselves.
Types of viruses
• Non-resident viruses
Non-resident viruses can be thought of as consisting of a finder
module and a replication module. The finder module is
responsible for finding new files to infect. For each new
executable file the finder module encounters, it calls the
replication module to infect that file.
Types of viruses
• Resident viruses
Resident viruses contain a replication module that is similar to
the one that is employed by non-resident viruses. This
module, however, is not called by a finder module. The virus
loads the replication module into memory when it is executed
instead and ensures that this module is executed each time the
operating system is called to perform a certain operation. The
replication module can be called, for example, each time the
operating system executes a file. In this case the virus infects
every suitable program that is executed on the computer.
Vectors and hosts
Viruses have targeted various types of transmission media or
hosts. This list is not exhaustive:
•Binary executable files (such as COM files and EXE files in MS-
DOS, Portable Executable files in Microsoft Windows, the Mach-
O format in OSX, and ELF files in Linux)
•Volume Boot Records of floppy disks and hard disk partitions
•The master boot record (MBR) of a hard disk
•General-purpose script files (such as batch files in MS-DOS and
Microsoft Windows, VBScript files, and shell script files on Unix-
like platforms).
Vectors and hosts
• System specific auto run script files (such as Autorun.inf file
needed by Windows to automatically run software stored on
USB memory storage devices).
• Documents that can contain macros (such as Microsoft Word
documents, Microsoft Excel spread sheets, AmiPro
documents, and Microsoft Access database files)
• Cross-site scripting vulnerabilities in web applications (see XSS
Worm)
Vectors and hosts
• Cross-site scripting vulnerabilities in web applications (see XSS
Worm)
• Arbitrary computer files. An exploitable buffer
overflow, format string, race condition or other exploitable
bug in a program which reads the file could be used to trigger
the execution of code hidden within it. Most bugs of this type
can be made more difficult to exploit in computer
architectures with protection features such as an execute
disable bit and/or address space layout randomization.
The vulnerability of operating systems to viruses
Just as genetic diversity in a population decreases the chance of
a single disease wiping out a population, the diversity of
software systems on a network similarly limits the destructive
potential of viruses and malware. This became a particular
concern in the 1990s, when Microsoft gained market dominance
in desktop operating systems, web browsers, and office suites.
Microsoft software is targeted by writers of viruses and malware
due to Microsoft's desktop dominance.
Although Windows is by far the most popular target operating
system for virus writers, viruses also exist on other platforms.
Any operating system that allows third-party programs to run
can theoretically run viruses.
The vulnerability of operating systems to viruses
• As of 2006, there were at least 60 known security exploits
targeting the base installation of Mac OS X (with a Unix-based
file system and kernel). The number of viruses for the older
Apple operating systems, known as Mac OS Classic, varies
greatly from source to source, with Apple stating that there
are only four known viruses, and independent sources stating
there are as many as 63 viruses. Many Mac OS Classic viruses
targeted the HyperCard authoring environment. The
difference in virus vulnerability between Macs and Windows
is a chief selling point, one that Apple uses in their Get a Mac
advertising. In January 2009, Symantec announced the
discovery of a trojan that targets Macs. This discovery did not
gain much coverage until April 2009.
Antivirus software and other preventive
measures
• Many users install antivirus software that can detect and
eliminate known viruses when the computer attempts to
download or run the executable (which may be distributed as
an email attachment, or on USB flash drives, for example).
Some antivirus software blocks known malicious web sites
that attempt to install malware. Antivirus software does not
change the underlying capability of hosts to transmit viruses.
Users must update their software regularly to patch security
vulnerabilities ("holes"). Antivirus software also needs to be
regularly updated in order to recognize the latest threats.
Antivirus software and other preventive
measures
• Examples of Microsoft Windows anti-virus and anti-malware
software include the optional Microsoft Security Essentials(for
Windows XP, Vista and Windows 7) for real-time
protection, the Windows Malicious Software Removal Tool
(now included with Windows (Security) Updates on "Patch
Tuesday", the second Tuesday of each month), and Windows
Defender (an optional download in the case of Windows XP).
Additionally, several capable antivirus software programs are
available for free download from the Internet (usually
restricted to non-commercial use).
How Antivirus software works
• Different anti-virus programs use different "signatures" to
identify viruses. The disadvantage of this detection method is
that users are only protected from viruses that are detected
by signatures in their most recent virus definition update, and
not protected from new viruses (see "zero-day attack"). A
second method to find viruses is to use a heuristic algorithm
based on common virus behaviors. This method has the
ability to detect new viruses for which anti-virus security firms
have yet to define a "signature", but it also gives rise to more
false positives than using signatures. False positives can be
disruptive, especially in a commercial environment.
How Antivirus software works
• There are two common methods that an antivirus software
application uses to detect viruses, as described in the
antivirus software article. The first, and by far the most
common method of virus detection is using a list of virus
signature definitions. This works by examining the content of
the computer's memory (its RAM, and boot sectors) and the
files stored on fixed or removable drives (hard drives, floppy
drives, or USB flash drives), and comparing those files against
a database of known virus "signatures".
How Antivirus software works
• A second method to find viruses is to use a heuristic algorithm
based on common virus behaviors. This method has the
ability to detect new viruses for which anti-virus security firms
have yet to define a "signature", but it also gives rise to more
false positives than using signatures. False positives can be
disruptive, especially in a commercial environment
Virus removal
• Many websites run by antivirus software companies provide free
online virus scanning, with limited cleaning facilities (the purpose of
the sites is to sell anti-virus products). Some websites—like Google
subsidiary VirusTotal.com—allow users to upload one or more
suspicious files to be scanned and checked by one or more antivirus
programs in one operation. Additionally, several capable antivirus
software programs are available for free download from the
Internet (usually restricted to non-commercial use). Microsoft
offers an optional free antivirus utility called Microsoft Security
Essentials, a Windows Malicious Software Removal Tool that is
updated as part of the regular Windows update regime, and an
older optional anti-malware (malware removal) tool Windows
Defender that has been upgraded to an antivirus product in
Windows 8.
Virus removal
• Some viruses disable System Restore and other important
Windows tools such as Task Manager and Command Prompt.
An example of a virus that does this is CiaDoor. Many such
viruses can be removed by rebooting the computer, entering
Windows safe mode with networking, and then using system
tools or Microsoft Safety Scanner. System Restore on
Windows Me, Windows XP, Windows Vista and Windows 7
can restore the registry and critical system files to a previous
checkpoint. Often a virus will cause a system to hang, and a
subsequent hard reboot will render a system restore point
from the same day corrupt. Restore points from previous days
should work provided the virus is not designed to corrupt the
restore files and does not exist in previous restore points.
History
• Academic work
The first academic work on the theory of computer viruses
(although the term "computer virus" was not used at that time)
was done in 1949 by John von Neumann who gave lectures at
the University of Illinois about the "Theory and Organization of
Complicated Automata". The work of von Neumann was later
published as the "Theory of self-reproducing automata". In his
essay von Neumann described how a computer program could
be designed to reproduce itself.

More Related Content

What's hot

Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)cdebraj16101991
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus Jayesh Naik
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyDipayan Sarkar
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 

What's hot (20)

Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Seminar project(computer virus)
Seminar project(computer virus)Seminar project(computer virus)
Seminar project(computer virus)
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
viruses
virusesviruses
viruses
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Computer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan ChakravarthyComputer Viruses- B S Kalyan Chakravarthy
Computer Viruses- B S Kalyan Chakravarthy
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Anti virus
Anti virusAnti virus
Anti virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Virus
VirusVirus
Virus
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 

Viewers also liked

Cdg61 ppcr reunion ppcr-contenu-de-la-reunion-du-15-12-2016
Cdg61 ppcr  reunion ppcr-contenu-de-la-reunion-du-15-12-2016Cdg61 ppcr  reunion ppcr-contenu-de-la-reunion-du-15-12-2016
Cdg61 ppcr reunion ppcr-contenu-de-la-reunion-du-15-12-2016Dominique Gayraud
 
Organigramme groupe MediaFut
Organigramme   groupe MediaFutOrganigramme   groupe MediaFut
Organigramme groupe MediaFutmadasufletel
 
La production des séries françaises et son économie.
La production des séries françaises et son économie.La production des séries françaises et son économie.
La production des séries françaises et son économie.Malika Ould fella
 
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...mug-fr
 
Présentation de Digital Factory, Vincent MAS, Lagardère Active
Présentation de Digital Factory, Vincent MAS, Lagardère ActivePrésentation de Digital Factory, Vincent MAS, Lagardère Active
Présentation de Digital Factory, Vincent MAS, Lagardère Activemug-fr
 
2015 ea offre-emploi-project-manager
2015 ea offre-emploi-project-manager2015 ea offre-emploi-project-manager
2015 ea offre-emploi-project-managerEventattitude
 
Organigramme MediaFutur
Organigramme MediaFuturOrganigramme MediaFutur
Organigramme MediaFuturmadasufletel
 
Organigramme des personnels_2014
Organigramme des personnels_2014Organigramme des personnels_2014
Organigramme des personnels_2014ManonBozec
 
Presentacion lagardere
Presentacion lagarderePresentacion lagardere
Presentacion lagardereIsma Ramos
 
Présentation Lagardère Active
Présentation Lagardère ActivePrésentation Lagardère Active
Présentation Lagardère ActiveAFMM
 
Rapport de mini stage en publicité
Rapport de mini stage en publicitéRapport de mini stage en publicité
Rapport de mini stage en publicitéYaya Im
 
Présentation d’entreprise
Présentation d’entreprisePrésentation d’entreprise
Présentation d’entreprisejoffrey8313
 
Health And Safety
Health And SafetyHealth And Safety
Health And SafetySaimaRafiq
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issuesBuxoo Abdullah
 
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...Christophe Pelletier
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 

Viewers also liked (20)

Cdg61 ppcr reunion ppcr-contenu-de-la-reunion-du-15-12-2016
Cdg61 ppcr  reunion ppcr-contenu-de-la-reunion-du-15-12-2016Cdg61 ppcr  reunion ppcr-contenu-de-la-reunion-du-15-12-2016
Cdg61 ppcr reunion ppcr-contenu-de-la-reunion-du-15-12-2016
 
Organigramme groupe MediaFut
Organigramme   groupe MediaFutOrganigramme   groupe MediaFut
Organigramme groupe MediaFut
 
La production des séries françaises et son économie.
La production des séries françaises et son économie.La production des séries françaises et son économie.
La production des séries françaises et son économie.
 
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...
GeoLab, la géolocalisation avec MarkLogic, Gregory CORONA et Yoann BLOT, 4Dco...
 
Présentation de Digital Factory, Vincent MAS, Lagardère Active
Présentation de Digital Factory, Vincent MAS, Lagardère ActivePrésentation de Digital Factory, Vincent MAS, Lagardère Active
Présentation de Digital Factory, Vincent MAS, Lagardère Active
 
2015 ea offre-emploi-project-manager
2015 ea offre-emploi-project-manager2015 ea offre-emploi-project-manager
2015 ea offre-emploi-project-manager
 
Canal+
Canal+Canal+
Canal+
 
Organigramme MediaFutur
Organigramme MediaFuturOrganigramme MediaFutur
Organigramme MediaFutur
 
Organigramme des personnels_2014
Organigramme des personnels_2014Organigramme des personnels_2014
Organigramme des personnels_2014
 
Presentacion lagardere
Presentacion lagarderePresentacion lagardere
Presentacion lagardere
 
Présentation Lagardère Active
Présentation Lagardère ActivePrésentation Lagardère Active
Présentation Lagardère Active
 
Google Analytics Etude de Cas CAROLL.pptx
Google Analytics Etude de Cas CAROLL.pptxGoogle Analytics Etude de Cas CAROLL.pptx
Google Analytics Etude de Cas CAROLL.pptx
 
Rapport de mini stage en publicité
Rapport de mini stage en publicitéRapport de mini stage en publicité
Rapport de mini stage en publicité
 
Présentation d’entreprise
Présentation d’entreprisePrésentation d’entreprise
Présentation d’entreprise
 
Health And Safety
Health And SafetyHealth And Safety
Health And Safety
 
Computer Safety
Computer SafetyComputer Safety
Computer Safety
 
Computer health & safety issues
Computer health & safety issuesComputer health & safety issues
Computer health & safety issues
 
Organigramme et structure
Organigramme et structure Organigramme et structure
Organigramme et structure
 
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...
La stratégie online de Warner Bros. France dans l'univers du cinéma, des séri...
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Similar to Computer Viruses: Causes, Types, Prevention and Removal

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................vndoon
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Similar to Computer Viruses: Causes, Types, Prevention and Removal (20)

Presentation2
Presentation2Presentation2
Presentation2
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
information about virus
information about virusinformation about virus
information about virus
 
computer Virus
computer Virus computer Virus
computer Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Computer Viruses: Causes, Types, Prevention and Removal

  • 1. Computer Viruses Done by Youssef Bahaa Al-Din Mahmoud Grade 9 A Under the supervision of Mr. Mohammed Salah Omar
  • 2. Introduction • A computer virus is a computer program that can replicate itself, and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, ransom ware, Trojan horses, key loggers, most rootkits, spyware, dishonest adware, malicious BHOs and other malicious software.
  • 3. Intoduction • The majority of active malware threats are usually Trojans or worms rather than viruses. Malware such as Trojan horses and worms is sometimes confused with viruses, which are technically different: a worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions.
  • 4. Introduction • Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.
  • 5. Types of viruses • Non-resident viruses Non-resident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file.
  • 6. Types of viruses • Resident viruses Resident viruses contain a replication module that is similar to the one that is employed by non-resident viruses. This module, however, is not called by a finder module. The virus loads the replication module into memory when it is executed instead and ensures that this module is executed each time the operating system is called to perform a certain operation. The replication module can be called, for example, each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer.
  • 7. Vectors and hosts Viruses have targeted various types of transmission media or hosts. This list is not exhaustive: •Binary executable files (such as COM files and EXE files in MS- DOS, Portable Executable files in Microsoft Windows, the Mach- O format in OSX, and ELF files in Linux) •Volume Boot Records of floppy disks and hard disk partitions •The master boot record (MBR) of a hard disk •General-purpose script files (such as batch files in MS-DOS and Microsoft Windows, VBScript files, and shell script files on Unix- like platforms).
  • 8. Vectors and hosts • System specific auto run script files (such as Autorun.inf file needed by Windows to automatically run software stored on USB memory storage devices). • Documents that can contain macros (such as Microsoft Word documents, Microsoft Excel spread sheets, AmiPro documents, and Microsoft Access database files) • Cross-site scripting vulnerabilities in web applications (see XSS Worm)
  • 9. Vectors and hosts • Cross-site scripting vulnerabilities in web applications (see XSS Worm) • Arbitrary computer files. An exploitable buffer overflow, format string, race condition or other exploitable bug in a program which reads the file could be used to trigger the execution of code hidden within it. Most bugs of this type can be made more difficult to exploit in computer architectures with protection features such as an execute disable bit and/or address space layout randomization.
  • 10. The vulnerability of operating systems to viruses Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses and malware. This became a particular concern in the 1990s, when Microsoft gained market dominance in desktop operating systems, web browsers, and office suites. Microsoft software is targeted by writers of viruses and malware due to Microsoft's desktop dominance. Although Windows is by far the most popular target operating system for virus writers, viruses also exist on other platforms. Any operating system that allows third-party programs to run can theoretically run viruses.
  • 11. The vulnerability of operating systems to viruses • As of 2006, there were at least 60 known security exploits targeting the base installation of Mac OS X (with a Unix-based file system and kernel). The number of viruses for the older Apple operating systems, known as Mac OS Classic, varies greatly from source to source, with Apple stating that there are only four known viruses, and independent sources stating there are as many as 63 viruses. Many Mac OS Classic viruses targeted the HyperCard authoring environment. The difference in virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising. In January 2009, Symantec announced the discovery of a trojan that targets Macs. This discovery did not gain much coverage until April 2009.
  • 12. Antivirus software and other preventive measures • Many users install antivirus software that can detect and eliminate known viruses when the computer attempts to download or run the executable (which may be distributed as an email attachment, or on USB flash drives, for example). Some antivirus software blocks known malicious web sites that attempt to install malware. Antivirus software does not change the underlying capability of hosts to transmit viruses. Users must update their software regularly to patch security vulnerabilities ("holes"). Antivirus software also needs to be regularly updated in order to recognize the latest threats.
  • 13. Antivirus software and other preventive measures • Examples of Microsoft Windows anti-virus and anti-malware software include the optional Microsoft Security Essentials(for Windows XP, Vista and Windows 7) for real-time protection, the Windows Malicious Software Removal Tool (now included with Windows (Security) Updates on "Patch Tuesday", the second Tuesday of each month), and Windows Defender (an optional download in the case of Windows XP). Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).
  • 14. How Antivirus software works • Different anti-virus programs use different "signatures" to identify viruses. The disadvantage of this detection method is that users are only protected from viruses that are detected by signatures in their most recent virus definition update, and not protected from new viruses (see "zero-day attack"). A second method to find viruses is to use a heuristic algorithm based on common virus behaviors. This method has the ability to detect new viruses for which anti-virus security firms have yet to define a "signature", but it also gives rise to more false positives than using signatures. False positives can be disruptive, especially in a commercial environment.
  • 15. How Antivirus software works • There are two common methods that an antivirus software application uses to detect viruses, as described in the antivirus software article. The first, and by far the most common method of virus detection is using a list of virus signature definitions. This works by examining the content of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives, or USB flash drives), and comparing those files against a database of known virus "signatures".
  • 16. How Antivirus software works • A second method to find viruses is to use a heuristic algorithm based on common virus behaviors. This method has the ability to detect new viruses for which anti-virus security firms have yet to define a "signature", but it also gives rise to more false positives than using signatures. False positives can be disruptive, especially in a commercial environment
  • 17. Virus removal • Many websites run by antivirus software companies provide free online virus scanning, with limited cleaning facilities (the purpose of the sites is to sell anti-virus products). Some websites—like Google subsidiary VirusTotal.com—allow users to upload one or more suspicious files to be scanned and checked by one or more antivirus programs in one operation. Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use). Microsoft offers an optional free antivirus utility called Microsoft Security Essentials, a Windows Malicious Software Removal Tool that is updated as part of the regular Windows update regime, and an older optional anti-malware (malware removal) tool Windows Defender that has been upgraded to an antivirus product in Windows 8.
  • 18. Virus removal • Some viruses disable System Restore and other important Windows tools such as Task Manager and Command Prompt. An example of a virus that does this is CiaDoor. Many such viruses can be removed by rebooting the computer, entering Windows safe mode with networking, and then using system tools or Microsoft Safety Scanner. System Restore on Windows Me, Windows XP, Windows Vista and Windows 7 can restore the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points.
  • 19. History • Academic work The first academic work on the theory of computer viruses (although the term "computer virus" was not used at that time) was done in 1949 by John von Neumann who gave lectures at the University of Illinois about the "Theory and Organization of Complicated Automata". The work of von Neumann was later published as the "Theory of self-reproducing automata". In his essay von Neumann described how a computer program could be designed to reproduce itself.