SlideShare a Scribd company logo
Edited :- Kanchana Eranga Bandara
 When we use computers it is important to prevent corruption and lost of user
data and let user to continue his work without any disturb. For this we must
secure our data.
 So it is very important to implement good security mechanisms.
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Unauthorized Action
• Hacking
• Cracking
Malicious software
Virus
Worm
Trojan Horse
Time Bomb
Logic Bomb
Edited :- Kanchana Eranga Bandara
Unauthorized Access
Hacking
• Trying to access or accessing the network by breaching the security by an
unauthorized person is known as hacking.
• Cheating others account numbers, credit card numbers and misuse them.
• Cheating trade secrets, confusing network devices are done by hacking.
• The person who does this is called a hacker.
Edited :- Kanchana Eranga Bandara
Cracking
• Changing software content, Serial number, security methods etc.
• This done by a programmer who is not licensed to do so is called cracking
Edited :- Kanchana Eranga Bandara
Malicious software
• Malware or Malicious software is software designed to damage a computer system
without the owner's concerns.
• Malicious software is a general term used by computer professionals to mean a
variety of annoying software or program codes.
• Malicious software includes Virus, Worm, Trojan, Adware, Root kit, Spyware and
many other unwanted software.
Edited :- Kanchana Eranga Bandara
Computer Virus
• A computer virus is a program code that can copy itself and infect a
computer without the permission of the user.
• In order to replicate itself, a virus must be permitted to execute and write
to memory.
• For this reason, many viruses attach themselves to an executable files that
may be part of legitimate programs. Some viruses change its own code by
itself.
• Viruses spread via network, floppy disk, CDs, USB drive.
Edited :- Kanchana Eranga Bandara
•Changes file size.
•Change system date and time.
•Slow down the computer.
•Shut down computer unexpectedly.
•Take more time to boot computer.
Symptoms of a virus attack
Edited :- Kanchana Eranga Bandara
Worm
• Worm is a self-replicating computer program.
• It uses a network to send copies of itself to other systems and it may do so without
any user intervention.
• Unlike a virus, it does not need to attach itself to an existing program.
Edited :- Kanchana Eranga Bandara
Trojan horse
• This is a program that disguises itself as program.
• Similar to a virus, these programs are hidden and cause an unwanted effect.
• They differ from viruses because they are normally not designed to replicate like
a virus.
•By showing that this is important software running in the computer the Trojan
horse opens a back door to the hacker.
• There after unauthorized person can get into the computer and do harmful to
the user data.
E.g.: By opening unknown e-mail attachments
Edited :- Kanchana Eranga Bandara
Symptoms when Trojan horse affects the computer:
•Sending the user’s important details to others.
•Changing or deleting data of the computer.
•Uploading and downloading data in an unauthorized way.
•Spreading malware such as viruses.
•Shutting down the computer unexpectedly.
•Unauthorized Software installation.
Edited :- Kanchana Eranga Bandara
• This is a virus which infects the boot sector of a hard disk or other disk drives.
• The boot sector is the portion that stores the boot program that has the code for
loading the operating system file onto memory.
• Once the boot sector is infected with the virus, it may rewrite the boot sector
making it unbootable or scramble the File Allocation Table (FAT).
Boot sector virus
Edited :- Kanchana Eranga Bandara
•Sudden error massages.
•Windows restart with a blue screen error message.
•Boot Failure.
•Fail to format a particular drive.
Symptoms when Boot Sector Virus affect the computer:
Edited :- Kanchana Eranga Bandara
• These viruses may be one of the type mentioned, but are designed to defeat
antivirus scanning and other antiviral software detection method (firewall).
• Mode of infection is from fake antivirus and software promoting website.
• This virus helps the other viruses too.
Stealth Virus
Edited :- Kanchana Eranga Bandara
• Software that is installed into a computer without the user's knowledge.
• Transmits information about the user's computer, and user activities over the
Internet.
• Redirect to sites which spoil the culture and the computer.
Spyware
Edited :- Kanchana Eranga Bandara
• Sending user’s important data to others.
• Unauthorized Software installation.
• Redirect Web browser to dangerous web sites.
• Change Computer settings.
• Using anti-spyware we can minimize the damages.
Symptoms when Spy ware affects to your computer:
Edited :- Kanchana Eranga Bandara
Time Bomb
• This is simply some code on a computer which does not immediately trigger.
• Instead, it is set to cause it's damage at some point in the future.
• Usually Time bombs are designed to take revenge towards a company or an
organization.
E.g.: Sending messages such as “You are a great FOOL!!!!” on April first.
OR
“vampire time” at 12 A.M
Edited :- Kanchana Eranga Bandara
• A logic bomb is a program which will execute a pre-programmed routine when a
designated condition is met.
• Logic bombs do not make copies of themselves.
• Logic bomb work as same as time bomb.
Logic bomb
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
 The large scale of creating virus is for business.
 Taking revenge.
 Like to see others suffering.
 Hobby and fun.
For virus creators?
How would you feel if your important files are corrupted or deleted? Its pretty
bad, it cause redoing all of our work. Therefore, creating and spreading
viruses is an activity one must never indulge in. After all, everyone’s work is as
precious as our are.
Mentally Affected
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara
Edited :- Kanchana Eranga Bandara

More Related Content

What's hot

File hippo
File hippoFile hippo
File hippo
Sandeep Kamath
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System
19940213
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
Frya Lora
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
Adetunji Adeoje
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
Rachel Espino
 
09 wp7 multitasking
09 wp7   multitasking09 wp7   multitasking
09 wp7 multitaskingTao Wang
 
TYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORSTYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORS
Perla Pelicano Corpez
 
Remote monitoring of pc- Project
Remote monitoring of pc- ProjectRemote monitoring of pc- Project
Remote monitoring of pc- Project
Ajo Alex
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
Dharmesh Kumar Sharma
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Ted Whittemore
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
Neha Kurale
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
VIKASH MAINANWAL
 
Software System
Software SystemSoftware System
Software System
Anil Neupane
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Presentation on computer software-system software.
Presentation on computer software-system software.Presentation on computer software-system software.
Presentation on computer software-system software.
johnraju213
 

What's hot (20)

File hippo
File hippoFile hippo
File hippo
 
Neethu Narayanan- Operating System
 Neethu Narayanan- Operating System Neethu Narayanan- Operating System
Neethu Narayanan- Operating System
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Conducting test on the installed computer system
Conducting test on the installed computer systemConducting test on the installed computer system
Conducting test on the installed computer system
 
Network Security
Network SecurityNetwork Security
Network Security
 
09 wp7 multitasking
09 wp7   multitasking09 wp7   multitasking
09 wp7 multitasking
 
TYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORSTYPES OF COMPUTER SYSTEM ERRORS
TYPES OF COMPUTER SYSTEM ERRORS
 
Remote monitoring of pc- Project
Remote monitoring of pc- ProjectRemote monitoring of pc- Project
Remote monitoring of pc- Project
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
Take Care of Your Computer Part 1 -- Disinfection Jan-19-2012
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Virus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwalVirus Attack & firewall by vikash mainanwal
Virus Attack & firewall by vikash mainanwal
 
Software System
Software SystemSoftware System
Software System
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Presentation on computer software-system software.
Presentation on computer software-system software.Presentation on computer software-system software.
Presentation on computer software-system software.
 

Similar to Presentation about virus part 1

Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
Azri Abdin
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Software
SoftwareSoftware
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
jenniel143
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
Plus91 Technologies Pvt. Ltd.
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
TayyabaAbbas4
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
Pratik Gupta
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Troubleshooting and maintenance
Troubleshooting and maintenanceTroubleshooting and maintenance
Troubleshooting and maintenance
Tech Bikram
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
sachingwalani24
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
Virus security presentation
Virus security presentationVirus security presentation
Virus security presentationYoungOldLuton
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 

Similar to Presentation about virus part 1 (20)

Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Software
SoftwareSoftware
Software
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Malicious
MaliciousMalicious
Malicious
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Chapter 6 effects of ict on society
Chapter 6   effects of ict on societyChapter 6   effects of ict on society
Chapter 6 effects of ict on society
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Troubleshooting and maintenance
Troubleshooting and maintenanceTroubleshooting and maintenance
Troubleshooting and maintenance
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virusppt
ViruspptVirusppt
Virusppt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus security presentation
Virus security presentationVirus security presentation
Virus security presentation
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 

More from Pasdunrata national collage of Education

Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
Pasdunrata national collage of Education
 
සාම්ප්‍රදායික කර්මාන්ත
සාම්ප්‍රදායික කර්මාන්ත සාම්ප්‍රදායික කර්මාන්ත
සාම්ප්‍රදායික කර්මාන්ත
Pasdunrata national collage of Education
 
The world after second world war
The world after second world warThe world after second world war
The world after second world war
Pasdunrata national collage of Education
 
Natural disasters in sri lanka(sinhala)
Natural disasters in sri lanka(sinhala)Natural disasters in sri lanka(sinhala)
Natural disasters in sri lanka(sinhala)
Pasdunrata national collage of Education
 
Chess presentation part 1 for beginners
Chess presentation part 1 for beginnersChess presentation part 1 for beginners
Chess presentation part 1 for beginners
Pasdunrata national collage of Education
 

More from Pasdunrata national collage of Education (6)

Kannangara
KannangaraKannangara
Kannangara
 
Wavelength division multiplexing
Wavelength division multiplexingWavelength division multiplexing
Wavelength division multiplexing
 
සාම්ප්‍රදායික කර්මාන්ත
සාම්ප්‍රදායික කර්මාන්ත සාම්ප්‍රදායික කර්මාන්ත
සාම්ප්‍රදායික කර්මාන්ත
 
The world after second world war
The world after second world warThe world after second world war
The world after second world war
 
Natural disasters in sri lanka(sinhala)
Natural disasters in sri lanka(sinhala)Natural disasters in sri lanka(sinhala)
Natural disasters in sri lanka(sinhala)
 
Chess presentation part 1 for beginners
Chess presentation part 1 for beginnersChess presentation part 1 for beginners
Chess presentation part 1 for beginners
 

Recently uploaded

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Recently uploaded (20)

Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

Presentation about virus part 1

  • 1. Edited :- Kanchana Eranga Bandara
  • 2.  When we use computers it is important to prevent corruption and lost of user data and let user to continue his work without any disturb. For this we must secure our data.  So it is very important to implement good security mechanisms. Edited :- Kanchana Eranga Bandara
  • 3. Edited :- Kanchana Eranga Bandara
  • 4. Unauthorized Action • Hacking • Cracking Malicious software Virus Worm Trojan Horse Time Bomb Logic Bomb Edited :- Kanchana Eranga Bandara
  • 5. Unauthorized Access Hacking • Trying to access or accessing the network by breaching the security by an unauthorized person is known as hacking. • Cheating others account numbers, credit card numbers and misuse them. • Cheating trade secrets, confusing network devices are done by hacking. • The person who does this is called a hacker. Edited :- Kanchana Eranga Bandara
  • 6. Cracking • Changing software content, Serial number, security methods etc. • This done by a programmer who is not licensed to do so is called cracking Edited :- Kanchana Eranga Bandara
  • 7. Malicious software • Malware or Malicious software is software designed to damage a computer system without the owner's concerns. • Malicious software is a general term used by computer professionals to mean a variety of annoying software or program codes. • Malicious software includes Virus, Worm, Trojan, Adware, Root kit, Spyware and many other unwanted software. Edited :- Kanchana Eranga Bandara
  • 8. Computer Virus • A computer virus is a program code that can copy itself and infect a computer without the permission of the user. • In order to replicate itself, a virus must be permitted to execute and write to memory. • For this reason, many viruses attach themselves to an executable files that may be part of legitimate programs. Some viruses change its own code by itself. • Viruses spread via network, floppy disk, CDs, USB drive. Edited :- Kanchana Eranga Bandara
  • 9. •Changes file size. •Change system date and time. •Slow down the computer. •Shut down computer unexpectedly. •Take more time to boot computer. Symptoms of a virus attack Edited :- Kanchana Eranga Bandara
  • 10. Worm • Worm is a self-replicating computer program. • It uses a network to send copies of itself to other systems and it may do so without any user intervention. • Unlike a virus, it does not need to attach itself to an existing program. Edited :- Kanchana Eranga Bandara
  • 11. Trojan horse • This is a program that disguises itself as program. • Similar to a virus, these programs are hidden and cause an unwanted effect. • They differ from viruses because they are normally not designed to replicate like a virus. •By showing that this is important software running in the computer the Trojan horse opens a back door to the hacker. • There after unauthorized person can get into the computer and do harmful to the user data. E.g.: By opening unknown e-mail attachments Edited :- Kanchana Eranga Bandara
  • 12. Symptoms when Trojan horse affects the computer: •Sending the user’s important details to others. •Changing or deleting data of the computer. •Uploading and downloading data in an unauthorized way. •Spreading malware such as viruses. •Shutting down the computer unexpectedly. •Unauthorized Software installation. Edited :- Kanchana Eranga Bandara
  • 13. • This is a virus which infects the boot sector of a hard disk or other disk drives. • The boot sector is the portion that stores the boot program that has the code for loading the operating system file onto memory. • Once the boot sector is infected with the virus, it may rewrite the boot sector making it unbootable or scramble the File Allocation Table (FAT). Boot sector virus Edited :- Kanchana Eranga Bandara
  • 14. •Sudden error massages. •Windows restart with a blue screen error message. •Boot Failure. •Fail to format a particular drive. Symptoms when Boot Sector Virus affect the computer: Edited :- Kanchana Eranga Bandara
  • 15. • These viruses may be one of the type mentioned, but are designed to defeat antivirus scanning and other antiviral software detection method (firewall). • Mode of infection is from fake antivirus and software promoting website. • This virus helps the other viruses too. Stealth Virus Edited :- Kanchana Eranga Bandara
  • 16. • Software that is installed into a computer without the user's knowledge. • Transmits information about the user's computer, and user activities over the Internet. • Redirect to sites which spoil the culture and the computer. Spyware Edited :- Kanchana Eranga Bandara
  • 17. • Sending user’s important data to others. • Unauthorized Software installation. • Redirect Web browser to dangerous web sites. • Change Computer settings. • Using anti-spyware we can minimize the damages. Symptoms when Spy ware affects to your computer: Edited :- Kanchana Eranga Bandara
  • 18. Time Bomb • This is simply some code on a computer which does not immediately trigger. • Instead, it is set to cause it's damage at some point in the future. • Usually Time bombs are designed to take revenge towards a company or an organization. E.g.: Sending messages such as “You are a great FOOL!!!!” on April first. OR “vampire time” at 12 A.M Edited :- Kanchana Eranga Bandara
  • 19. • A logic bomb is a program which will execute a pre-programmed routine when a designated condition is met. • Logic bombs do not make copies of themselves. • Logic bomb work as same as time bomb. Logic bomb Edited :- Kanchana Eranga Bandara
  • 20. Edited :- Kanchana Eranga Bandara
  • 21.  The large scale of creating virus is for business.  Taking revenge.  Like to see others suffering.  Hobby and fun. For virus creators? How would you feel if your important files are corrupted or deleted? Its pretty bad, it cause redoing all of our work. Therefore, creating and spreading viruses is an activity one must never indulge in. After all, everyone’s work is as precious as our are. Mentally Affected Edited :- Kanchana Eranga Bandara
  • 22. Edited :- Kanchana Eranga Bandara
  • 23. Edited :- Kanchana Eranga Bandara
  • 24. Edited :- Kanchana Eranga Bandara
  • 25. Edited :- Kanchana Eranga Bandara
  • 26. Edited :- Kanchana Eranga Bandara
  • 27. Edited :- Kanchana Eranga Bandara