SlideShare a Scribd company logo
1 of 18
Submitted To:
Prof. Dr. Amita Verma
TOPIC: COMPUTER VIRUS
Submitted By:
Vaibhav Rattan
B.A. LL.B. Section-C
Semester 10 Roll No.:
170/19
INFORMATION TECHNOLOGY LAWS
Generally
computer
malicious
speaking, a
virus is a type of
software, or
malware, that spreads between
computers and causes damage
to data
Computer
and software.
viruses aim to
disrupt systems, cause major
operational issues, and result
in data loss and leakage. For
instance, you could receive an
email with
attachment,
unknowingly,
a malicious
open
and
the file
then the
on your
computer virus runs
computer.
What is a computer virus?
Section 43 of the Information Technology Act,
2000 defines “Computer Virus” as any computer
instruction, information, data or programme that
destroys, damages, degrades or adversely
affects the performance of a computer resource
or attaches itself to another computer resource
and operates when a programme, data or
instruction is executed or some other event
takes place in that computer resource.
Section 66 of the Information T
echnology Act
provides punishment for Computer related
offences.
“If any person, dishonestly or fraudulently, does
any act referred to in section 43, he shall be
punishable with imprisonment for a term which
may extend to three years or with fine which
may extend to five lakh rupees or with both.”
How do computer viruses work?
At their core, computer viruses are discreet
programs that hitch a ride on other files or
applications.
objective is
In most cases, their primary
to replicate and spread like
wildfire.
Computer viruses function as malicious
software programs designed to infect other
programs by modifying them in some way. In
doing so, a virus will attach itself to an
unsuspecting file or application in order to
spread.
The Infection
A virus can attach itself to any
Process
legitimate
program or document that supports macros to
execute its code, such as an email attachment
or a file download from a website. Once the file
is opened or downloaded, the virus springs into
action and starts executing.
Hiding in Plain Sight
Computer viruses can be quite crafty to remain
hidden from both users and antivirus software
alike. Viruses employ stealth techniques such
as polymorphism, which changes their
appearance, or encryption methods.
The Damage Done
Once activated, a virus may wreak havoc on
your computer system. It can steal sensitive
data, corrupt files, slow down performance, and
even crash your entire system. It can spread
from system to system after a user takes action
that either intentionally or accidentally facilitates
it.
Symptoms
The following are the symptoms that your
computer might have a virus:
Slow-running computer: programs freeze or
take a long time to load;
Screen pop-ups: including endless spam, error
messages,
redirects
unsolicited,
to
unwanted ads, and
weird
files
Disappearing files:
damaged, deleted, and/or
websites;
get randomly
encrypted;
Antivirus software not working: the program
or firewall deletes or disables itself;
Suspicious programs: consistently appear,
along with toolbars/icons you’ve never installed;
Email spam: with added attachments and/or
links flooding your inbox;
System blocking: you’re unable to access your
files, or system preferences;
draining: your
settings,
Battery
and/or quickly
computer
loses
overheats
power;
Homepage switching: randomly replacing and
redirecting your homepage to other websites;
Mass email send-outs: spam messages sent
from your account to your contacts.
TYPES OF COMPUTER VIRUSES
Boot Sector Virus – It is a type of virus that infects
the boot sector of floppy disks or the Master Boot
Record (MBR) of hard disks. The Boot sector
comprises all the files which are required to start the
Operating system of the computer. The virus either
overwrites the existing program or copies itself to
another part of the disk.
Direct Action Virus – When a virus attaches itself
directly to a .exe or .com file and enters the device
while its execution is called a Direct Action Virus. If it
gets installed in the memory, it keeps itself hidden. It
is also known as Non-Resident Virus.
Types of computer virus
Boot Sector Virus – It is a type of virus that
infects the boot sector of floppy disks or the
Master Boot Record (MBR) of hard disks. The
Boot sector comprises all the files which are
required to start the Operating system of the
computer. The virus either overwrites the existing
program or copies itself to another part of the
disk.
Direct Action Virus – When a virus attaches
itself directly to a .exe or .com file and enters the
device while its execution is called a Direct Action
Virus. If it gets installed in the memory, it keeps
itself hidden. It is also known as Non-Resident
Virus.
Resident Virus – A virus which saves itself in
the memory of the computer and then infects
other files and programs when its originating
program is no longer working. This virus can
easily infect other files because it is hidden in
the memory and is hard to be removed from the
system.
Multipartite Virus – A virus which can attack
both, the boot sector and the executable files of
an already infected computer is called a
multipartite virus. If a multipartite virus attacks
your system, you are at risk of cyber threat.
Overwrite Virus – One of the most harmful
viruses, the overwrite virus can completely
remove the existing program and replace it with
the malicious code by overwriting it. Gradually it
can completely replace the host’s programming
code with the harmful code.
Polymorphic Virus – Spread through spam and
infected websites, the polymorphic virus are file
infectors which are complex and are tough to
detect. They create a modified or morphed
version of the existing program and infect the
system and retain the original code.
File Infector Virus – As the name suggests, it
first infects a single file and then later spreads
itself to other executable files and programs.
The main source of this virus are games and
word processors.
Spacefiller Virus – It is a rare type of virus
which fills in the empty spaces of a file with
viruses. It is known as cavity virus. It will neither
affect the size of the file nor can be detected
easily.
Macro Virus – A virus written in the same
macro language as used in the software
program and infects the computer if a word
processor file is opened. Mainly the source of
such viruses is via emails.
SOME
DEADLIEST
VIRUSES
MYDOOM
The worst computer virus outbreak in history, Mydoom
caused estimated damage of $38 billion in 2004. Also
known as Novarg, this malware is technically a “worm,”
spread by mass emailing. At one point, the Mydoom
virus was responsible for 25% of all emails sent.
THE ILOVEYOU VIRUS
This virus caused chaos worldwide, inflicting an
estimated $ 10 billion in damages. It leveraged social
engineering to trick people into opening an attachment
that appeared to be a love confession. However, the
attachment was actually a malicious script.
Once activated, the virus would send itself to everyone
in the user’s email list and overwrite files, rendering the
computer unusable.
THE MELISSA VIRUS
Named after an exotic dancer from Florida, this
virus was created by David L. Smith in 1999.
Once activated, the virus would email itself to the
top 50 contacts in the user’s email list, causing a
surge in email traffic that disrupted services for
governments and corporations. It
also occasionally
The virus reportedly
altered documents.
caused $80 million in
damages.
Conclusion
In conclusion, the exploration of
computer viruses underscores the
constant threat to digital systems. This
project has revealed the evolving
nature of malware, emphasizing the
importance of robust cybersecurity
measures. Viruses, often disguised in
innocuous files, exploit vulnerabilities
to compromise data integrity and
system functionality. As technology
advances, so do the techniques
employed by malicious
necessitating proactive
actors,
defense
strategies.
THANK
YOU!

More Related Content

Similar to PPT on information technology laws description

Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 

Similar to PPT on information technology laws description (20)

Computer virus
Computer virusComputer virus
Computer virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
viruses
virusesviruses
viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
virus
virusvirus
virus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 

Recently uploaded

一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
mefyqyn
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
mefyqyn
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
BrV
 
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
mefyqyn
 
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
afukemk
 

Recently uploaded (20)

Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?
 
Law of succession-Notes for students studying law
Law of succession-Notes for students studying lawLaw of succession-Notes for students studying law
Law of succession-Notes for students studying law
 
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
一比一原版(MSU毕业证书)密苏里州立大学毕业证成绩单原件一模一样
 
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoiEmbed-1-1.pdfohediooieoiehohoiefoloeohefoi
Embed-1-1.pdfohediooieoiehohoiefoloeohefoi
 
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
一比一原版(Indiana State毕业证书)印第安纳州立大学毕业证成绩单原件一模一样
 
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
Comprehensive Guide on Drafting Directors' Report and its ROC Compliances und...
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
 
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdklEmbed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
Embed-3-2.pdfkp[k[odk[odk[d[ok[d[pkdkdkl
 
TTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx PresentationTTD - PPT on social stock exchange.pptx Presentation
TTD - PPT on social stock exchange.pptx Presentation
 
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
Skill Development in Law, Para Legal & other Fields and Export of Trained Man...
 
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
一比一原版(ASU毕业证书)亚利桑那州立大学毕业证成绩单原件一模一样
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
 
Termination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptxTermination of Employees under the Labor Code.pptx
Termination of Employees under the Labor Code.pptx
 
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
一比一原版(UC Berkeley毕业证书)加利福尼亚大学伯克利分校毕业证成绩单原件一模一样
 
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
一比一原版美国加州大学戴维斯分校毕业证(ucd毕业证书)学位证书仿制
 
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
Embed-2-2.pdf[[app[r[prf[-rk;lme;[ed[prp[
 
How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?How Can an Attorney Help With My Car Accident Claim?
How Can an Attorney Help With My Car Accident Claim?
 
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptxCASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
CASE STYDY Lalman Shukla v Gauri Dutt BY MUKUL TYAGI.pptx
 
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASESHOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
HOW LAW FIRMS CAN SUPPORT MILITARY DIVORCE CASES
 
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdfposts-harmful-to-secular-structure-of-the-country-539103-1.pdf
posts-harmful-to-secular-structure-of-the-country-539103-1.pdf
 

PPT on information technology laws description

  • 1. Submitted To: Prof. Dr. Amita Verma TOPIC: COMPUTER VIRUS Submitted By: Vaibhav Rattan B.A. LL.B. Section-C Semester 10 Roll No.: 170/19 INFORMATION TECHNOLOGY LAWS
  • 2. Generally computer malicious speaking, a virus is a type of software, or malware, that spreads between computers and causes damage to data Computer and software. viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. For instance, you could receive an email with attachment, unknowingly, a malicious open and the file then the on your computer virus runs computer.
  • 3. What is a computer virus? Section 43 of the Information Technology Act, 2000 defines “Computer Virus” as any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource.
  • 4. Section 66 of the Information T echnology Act provides punishment for Computer related offences. “If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.”
  • 5. How do computer viruses work? At their core, computer viruses are discreet programs that hitch a ride on other files or applications. objective is In most cases, their primary to replicate and spread like wildfire. Computer viruses function as malicious software programs designed to infect other programs by modifying them in some way. In doing so, a virus will attach itself to an unsuspecting file or application in order to spread.
  • 6. The Infection A virus can attach itself to any Process legitimate program or document that supports macros to execute its code, such as an email attachment or a file download from a website. Once the file is opened or downloaded, the virus springs into action and starts executing. Hiding in Plain Sight Computer viruses can be quite crafty to remain hidden from both users and antivirus software alike. Viruses employ stealth techniques such as polymorphism, which changes their appearance, or encryption methods.
  • 7. The Damage Done Once activated, a virus may wreak havoc on your computer system. It can steal sensitive data, corrupt files, slow down performance, and even crash your entire system. It can spread from system to system after a user takes action that either intentionally or accidentally facilitates it.
  • 8. Symptoms The following are the symptoms that your computer might have a virus: Slow-running computer: programs freeze or take a long time to load; Screen pop-ups: including endless spam, error messages, redirects unsolicited, to unwanted ads, and weird files Disappearing files: damaged, deleted, and/or websites; get randomly encrypted; Antivirus software not working: the program or firewall deletes or disables itself;
  • 9. Suspicious programs: consistently appear, along with toolbars/icons you’ve never installed; Email spam: with added attachments and/or links flooding your inbox; System blocking: you’re unable to access your files, or system preferences; draining: your settings, Battery and/or quickly computer loses overheats power; Homepage switching: randomly replacing and redirecting your homepage to other websites; Mass email send-outs: spam messages sent from your account to your contacts.
  • 10. TYPES OF COMPUTER VIRUSES Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are required to start the Operating system of the computer. The virus either overwrites the existing program or copies itself to another part of the disk. Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters the device while its execution is called a Direct Action Virus. If it gets installed in the memory, it keeps itself hidden. It is also known as Non-Resident Virus. Types of computer virus Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files which are required to start the Operating system of the computer. The virus either overwrites the existing program or copies itself to another part of the disk. Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and enters the device while its execution is called a Direct Action Virus. If it gets installed in the memory, it keeps itself hidden. It is also known as Non-Resident Virus.
  • 11. Resident Virus – A virus which saves itself in the memory of the computer and then infects other files and programs when its originating program is no longer working. This virus can easily infect other files because it is hidden in the memory and is hard to be removed from the system. Multipartite Virus – A virus which can attack both, the boot sector and the executable files of an already infected computer is called a multipartite virus. If a multipartite virus attacks your system, you are at risk of cyber threat.
  • 12. Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely remove the existing program and replace it with the malicious code by overwriting it. Gradually it can completely replace the host’s programming code with the harmful code. Polymorphic Virus – Spread through spam and infected websites, the polymorphic virus are file infectors which are complex and are tough to detect. They create a modified or morphed version of the existing program and infect the system and retain the original code.
  • 13. File Infector Virus – As the name suggests, it first infects a single file and then later spreads itself to other executable files and programs. The main source of this virus are games and word processors. Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file with viruses. It is known as cavity virus. It will neither affect the size of the file nor can be detected easily. Macro Virus – A virus written in the same macro language as used in the software program and infects the computer if a word processor file is opened. Mainly the source of such viruses is via emails.
  • 15. MYDOOM The worst computer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. THE ILOVEYOU VIRUS This virus caused chaos worldwide, inflicting an estimated $ 10 billion in damages. It leveraged social engineering to trick people into opening an attachment that appeared to be a love confession. However, the attachment was actually a malicious script. Once activated, the virus would send itself to everyone in the user’s email list and overwrite files, rendering the computer unusable.
  • 16. THE MELISSA VIRUS Named after an exotic dancer from Florida, this virus was created by David L. Smith in 1999. Once activated, the virus would email itself to the top 50 contacts in the user’s email list, causing a surge in email traffic that disrupted services for governments and corporations. It also occasionally The virus reportedly altered documents. caused $80 million in damages.
  • 17. Conclusion In conclusion, the exploration of computer viruses underscores the constant threat to digital systems. This project has revealed the evolving nature of malware, emphasizing the importance of robust cybersecurity measures. Viruses, often disguised in innocuous files, exploit vulnerabilities to compromise data integrity and system functionality. As technology advances, so do the techniques employed by malicious necessitating proactive actors, defense strategies.