SlideShare a Scribd company logo
1 of 11
Computer Viruses
Name:-CUSSON NGWENYA
Presentation
 Introduction
 Symptoms
 How does it spread
 Types of Computer Viruses
 Prevention Methods
 Antivirus Programs
Introduction
 A computer virus is a program which replicates
itself, damages or corrupts files and memory of
the computer, for example, a Trojan horse. By
replication, it means that the virus can multiply
itself (produces several similar copies of itself)
when it enters the computer system.
Signs and symptoms of virus attack on a
computer
 Reduced system performance (reduced speed
of operation)
 The size of available free memory
reduces.
 Unexplained and frequent lose of data
held in the computer
 The computer fails to boot.
 The hard disk becomes inaccessible (the
user cannot access data held in the
computer)
Effects of computer viruses
 Memory of a computer will be used up, slows down
computer.
 Alters system settings.
 Erases and corrupts files and data on the computer.
 Infects other computers on network.
 Leads to production loss.
 Leads to financial loss.
 The computer fails to boot.
 The computer system produces wrong results of a
process.
How does it spread
 Can come as e-mail attachments
 Can come with downloads from bulletin boards
 Computer viruses spread by attaching themselves
to other computer program files.
 When you exchange a file or pen drive with a virus,
the virus spreads from one computer to the
another.
 Viruses also spreads when a Computer Engineer
comes to repair your system and puts his/her
diagnostics disks in your PC
Types of computer viruses
 Boot sector Viruses- These viruses affect
the booting sector on the hard disk so
that the computer fails to boot.
 Time bomb- Virus attack and destroys
computer files at a specific date and
time
 Logic bombs -A type of virus that attacks
the computer when a specific event
occurs and destroys everything on the
computer disk like the Friday the 13th
Types of computer viruses
(cont’d)
 Trojan Horse virus -These are viruses that appears as
programs useful to the user with the intention of soliciting
information like user accounts and passwords or damaging
computer system files.
 WORM viruses -A program capable of reproducing itself and
spread from one computer to the next over a network and
damage computer files.
 File sector Viruses -These viruses destroy files that are
created by users on the computer.
Methods of prevention
 Install an Antivirus software
 Regularly update the program
 Do not open file attachments from unknown
sources or download doubtful software from
the Internet. Do not use files that come from
unknown sources.
 Buy original software and do not buy pirated
software
 Open email attachment files only if you are
expecting the attached files, or the sender is
known and has confirmed sending the file
 Try to avoid downloading and installing
software from the Internet
Antivirus Programs
 Avg
 Avira
 Norton Anti-Virus
 MaCfee
 Avast
 Panda
These are programs that detect computer viruses and reduce
the risk of computers being attacked by viruses for example
Thank You

More Related Content

What's hot

Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010iarthur
 
Computer viruses
Computer virusesComputer viruses
Computer virusesRaseena EV
 
Computer virus
Computer virusComputer virus
Computer virusUtchi
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computingcollimic
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 

What's hot (20)

Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ch. 3 computer virus
Ch. 3 computer virusCh. 3 computer virus
Ch. 3 computer virus
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus
Virus Virus
Virus
 
Presentación1
Presentación1Presentación1
Presentación1
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
Malware and careless computing
Malware and careless computingMalware and careless computing
Malware and careless computing
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 

Viewers also liked

JJacobson_Policy Analysis Paper
JJacobson_Policy Analysis PaperJJacobson_Policy Analysis Paper
JJacobson_Policy Analysis PaperJacquie Pinkerton
 
Projektant Depot I Dyskonto Sklepy
Projektant Depot I Dyskonto Sklepy Projektant Depot I Dyskonto Sklepy
Projektant Depot I Dyskonto Sklepy learnedanother261
 
Resume aman kumar
Resume aman kumarResume aman kumar
Resume aman kumaraman kumar
 
6 навчика. синергія (рус)
6 навчика. синергія (рус)6 навчика. синергія (рус)
6 навчика. синергія (рус)Sergiy Terentyev
 
CLICK PPT
CLICK PPTCLICK PPT
CLICK PPTAira C.
 
Fukushima Nuclear Accident - Causes
Fukushima Nuclear Accident - CausesFukushima Nuclear Accident - Causes
Fukushima Nuclear Accident - CausesChan Jocelyn
 

Viewers also liked (10)

Baclofene Posologie
Baclofene PosologieBaclofene Posologie
Baclofene Posologie
 
JJacobson_Policy Analysis Paper
JJacobson_Policy Analysis PaperJJacobson_Policy Analysis Paper
JJacobson_Policy Analysis Paper
 
Projektant Depot I Dyskonto Sklepy
Projektant Depot I Dyskonto Sklepy Projektant Depot I Dyskonto Sklepy
Projektant Depot I Dyskonto Sklepy
 
Resume aman kumar
Resume aman kumarResume aman kumar
Resume aman kumar
 
L8-A1
L8-A1L8-A1
L8-A1
 
6 навчика. синергія (рус)
6 навчика. синергія (рус)6 навчика. синергія (рус)
6 навчика. синергія (рус)
 
Baclofene Posologie
Baclofene PosologieBaclofene Posologie
Baclofene Posologie
 
CLICK PPT
CLICK PPTCLICK PPT
CLICK PPT
 
Kelompokgastritis d32fa2reg
Kelompokgastritis d32fa2regKelompokgastritis d32fa2reg
Kelompokgastritis d32fa2reg
 
Fukushima Nuclear Accident - Causes
Fukushima Nuclear Accident - CausesFukushima Nuclear Accident - Causes
Fukushima Nuclear Accident - Causes
 

Similar to Computer Viruses: Types, Symptoms & Prevention

Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
Computer virus
Computer virusComputer virus
Computer viruskiran_a_c
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer VirusImtiaz Ahmed
 
Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptxAkshayIngole17
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malwareaaberra
 
computer virus.pptx
computer virus.pptxcomputer virus.pptx
computer virus.pptxgcuf
 
Computer virus
Computer virusComputer virus
Computer virushrithikjha
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus
Computer virusComputer virus
Computer virusGoa App
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 

Similar to Computer Viruses: Types, Symptoms & Prevention (20)

Harmful software
Harmful softwareHarmful software
Harmful software
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus ICT 402.pptx
Computer Virus ICT 402.pptxComputer Virus ICT 402.pptx
Computer Virus ICT 402.pptx
 
How to Protect your PC from Malware
How to Protect your PC from MalwareHow to Protect your PC from Malware
How to Protect your PC from Malware
 
viruses
virusesviruses
viruses
 
computer virus.pptx
computer virus.pptxcomputer virus.pptx
computer virus.pptx
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Computer Viruses: Types, Symptoms & Prevention

  • 2. Presentation  Introduction  Symptoms  How does it spread  Types of Computer Viruses  Prevention Methods  Antivirus Programs
  • 3. Introduction  A computer virus is a program which replicates itself, damages or corrupts files and memory of the computer, for example, a Trojan horse. By replication, it means that the virus can multiply itself (produces several similar copies of itself) when it enters the computer system.
  • 4. Signs and symptoms of virus attack on a computer  Reduced system performance (reduced speed of operation)  The size of available free memory reduces.  Unexplained and frequent lose of data held in the computer  The computer fails to boot.  The hard disk becomes inaccessible (the user cannot access data held in the computer)
  • 5. Effects of computer viruses  Memory of a computer will be used up, slows down computer.  Alters system settings.  Erases and corrupts files and data on the computer.  Infects other computers on network.  Leads to production loss.  Leads to financial loss.  The computer fails to boot.  The computer system produces wrong results of a process.
  • 6. How does it spread  Can come as e-mail attachments  Can come with downloads from bulletin boards  Computer viruses spread by attaching themselves to other computer program files.  When you exchange a file or pen drive with a virus, the virus spreads from one computer to the another.  Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC
  • 7. Types of computer viruses  Boot sector Viruses- These viruses affect the booting sector on the hard disk so that the computer fails to boot.  Time bomb- Virus attack and destroys computer files at a specific date and time  Logic bombs -A type of virus that attacks the computer when a specific event occurs and destroys everything on the computer disk like the Friday the 13th
  • 8. Types of computer viruses (cont’d)  Trojan Horse virus -These are viruses that appears as programs useful to the user with the intention of soliciting information like user accounts and passwords or damaging computer system files.  WORM viruses -A program capable of reproducing itself and spread from one computer to the next over a network and damage computer files.  File sector Viruses -These viruses destroy files that are created by users on the computer.
  • 9. Methods of prevention  Install an Antivirus software  Regularly update the program  Do not open file attachments from unknown sources or download doubtful software from the Internet. Do not use files that come from unknown sources.  Buy original software and do not buy pirated software  Open email attachment files only if you are expecting the attached files, or the sender is known and has confirmed sending the file  Try to avoid downloading and installing software from the Internet
  • 10. Antivirus Programs  Avg  Avira  Norton Anti-Virus  MaCfee  Avast  Panda These are programs that detect computer viruses and reduce the risk of computers being attacked by viruses for example