SlideShare a Scribd company logo
1 of 12
B.ed First Year Session 2020-22
EPC 3-Criticial understanding of ICT
Name: Km.Madhu Devi
Roll Number#2059
Computer Virus and its
management
Overview
What is computer Virus & its
historical prospective?
What are its various types?
How does it impact us?
How can we manage it?
A computer virus is a type of computer
program that, when executed,
replicates itself by modifying other
computer programs and inserting its
own code. If this replication succeeds,
the affected areas are then said to be
"infected" with a computer virus.
The first computer virus, called "Creeper system",
was an experimental self-
replicating virus released in 1971. It was filling up
the hard drive until a computer could not operate
any further. This virus was created by BBN
technologies in the US. The first computer
virus for MS-DOS was "Brain" and was released in
1986.
Resident vs. non-resident viruses
Macro viruses
Boot sector viruses
Email virus
A memory-resident virus (or simply "resident virus")
installs itself as part of the operating system when
executed, after which it remains in RAM from the time
the computer is booted up to when it is shut down.
Resident viruses overwrite interrupt handling code or
other functions, and when the operating system
attempts to access the target file or disk sector, the
virus code intercepts the request and redirects
the control flow to the replication module, infecting the
target
A macro virus (or "document virus") is a virus
that is written in a macro language and
embedded into these documents so that
when users open the file, the virus code is
executed, and can infect the user's computer.
This is one of the reasons that it is
dangerous to open unexpected or
suspicious attachments in e-mails
Boot sector viruses specifically target
the boot sector and/or the Master Boot
Record (MBR) of the host's hard disk
drive, solid-state drive, or removable
storage media (flash drives, floppy
disks, etc.).
Email viruses are viruses that intentionally, rather
than accidentally, uses the email system to spread.
While virus infected files may be accidentally sent
as email attachments, email viruses are aware of
email system functions. They generally target a
specific type of email system (Microsoft Outlook is
the most commonly used), harvest email addresses
from various sources, and may append copies of
themselves to all email sent, or may generate email
messages containing copies of themselves as
attachments
Install Anti-Virus/Malware Software.
Keep Your Anti-Virus Software Up to Date
Run Regularly Scheduled Scans with Your Anti-Virus
Software.
Keep Your Operating System Current.
Secure Your Network.
Think Before You Click.
Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Back Up Your Files.
Use Multiple Strong Passwords.
Thanks and Regards
: Km.Madhu Devi
B.Ed First Year
Roll# 2059

More Related Content

Similar to Madhu Devi ppt(computer virus and its management).pptx

Similar to Madhu Devi ppt(computer virus and its management).pptx (20)

DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Virus
VirusVirus
Virus
 

More from DEEP TIWARI

PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxPRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxDEEP TIWARI
 
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptPiaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptDEEP TIWARI
 
ewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxDEEP TIWARI
 
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTPRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTDEEP TIWARI
 
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxMadhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxDEEP TIWARI
 
business management project on new topic
business management project on new topicbusiness management project on new topic
business management project on new topicDEEP TIWARI
 
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxKHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxDEEP TIWARI
 
deepchandtiwari.pptx
deepchandtiwari.pptxdeepchandtiwari.pptx
deepchandtiwari.pptxDEEP TIWARI
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
REHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfREHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfDEEP TIWARI
 
PF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxPF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxDEEP TIWARI
 
Time tableexam 2018
Time tableexam 2018Time tableexam 2018
Time tableexam 2018DEEP TIWARI
 

More from DEEP TIWARI (13)

PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxPRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
 
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptPiaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
 
ewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptx
 
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTPRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
 
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxMadhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
 
business management project on new topic
business management project on new topicbusiness management project on new topic
business management project on new topic
 
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxKHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
 
deepchandtiwari.pptx
deepchandtiwari.pptxdeepchandtiwari.pptx
deepchandtiwari.pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
REHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfREHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdf
 
PF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxPF_Declartion_Form (1).docx
PF_Declartion_Form (1).docx
 
Cala
CalaCala
Cala
 
Time tableexam 2018
Time tableexam 2018Time tableexam 2018
Time tableexam 2018
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Madhu Devi ppt(computer virus and its management).pptx

  • 1. B.ed First Year Session 2020-22 EPC 3-Criticial understanding of ICT Name: Km.Madhu Devi Roll Number#2059
  • 2. Computer Virus and its management
  • 3. Overview What is computer Virus & its historical prospective? What are its various types? How does it impact us? How can we manage it?
  • 4. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
  • 5. The first computer virus, called "Creeper system", was an experimental self- replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
  • 6. Resident vs. non-resident viruses Macro viruses Boot sector viruses Email virus
  • 7. A memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down. Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target
  • 8. A macro virus (or "document virus") is a virus that is written in a macro language and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer. This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails
  • 9. Boot sector viruses specifically target the boot sector and/or the Master Boot Record (MBR) of the host's hard disk drive, solid-state drive, or removable storage media (flash drives, floppy disks, etc.).
  • 10. Email viruses are viruses that intentionally, rather than accidentally, uses the email system to spread. While virus infected files may be accidentally sent as email attachments, email viruses are aware of email system functions. They generally target a specific type of email system (Microsoft Outlook is the most commonly used), harvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments
  • 11. Install Anti-Virus/Malware Software. Keep Your Anti-Virus Software Up to Date Run Regularly Scheduled Scans with Your Anti-Virus Software. Keep Your Operating System Current. Secure Your Network. Think Before You Click. Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Back Up Your Files. Use Multiple Strong Passwords.
  • 12. Thanks and Regards : Km.Madhu Devi B.Ed First Year Roll# 2059