SlideShare a Scribd company logo
SECURING THE COMPUTER FROM VIRUSES
SUBMITTED TO :- SUBMITTED BY :-
Dr. Shiva Shukla Md.Mustafizur Rahman
Assistant Professor M.Ed. 2nd Semester
Department of Education Regd.No.-17mededu07
Central University of Punjab
Contents…
• What is a computer Virus?
• Types of Computer Virus
• Boot Sector Virus
• Multipartite Virus
• Worm Virus
• E-mail Virus
• Micro Virus
• Computer crime Security and Privacy
• Virus Precautions
• Privacy How Did They Get My Data?
• Privacy Legislation
• Prevention
• Signs Your Computer is Infected
• Computer Virus History
• How to Make Your Home Machine As Secure As at Work
• Steps to help remove a virus
• Total Number of virus by year
• Password Security
What is a Computer Virus?
• A Computer Virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the user.
• A computer Virus can only spread from one computer
to another when its host is taken to the uninfected
computer, for instance by a user Sending it over a
network or the internet, or by carrying it on a
removable medium such as a floppy disk Cd , or USB
drive.
Types of Computer Virus
Boot
Sector
Virus
Multipartite
Virus Worm Virus
E-mail Virus Macro Virus
Boot Sector Virus
 It is a Computer Virus designed to infect the boot
of the disk. It modifies or replaces the executable
program in the boot Sector of the disk preventing
the computer from being able to boot or start up.
 Eg. Disk Killer , Danish boot etc.
Multipartite Virus
 A hybrid of Boot Program / file Viruses. They
infect program files and when the infect the boot
record. When you boot the computer next time
the virus from the boot record loads in memory
and then start infecting other program files on
disk.
Eg. Invader, tequila etc.
Worm Virus
■ A Computer Worm is a Self-replicating computer
program. It uses a network to send copies of itself
to other nodes computer terminals on the network
and it may do so without any user intervention. It
always cause harm to the network, if only by
consuming bandwidth.
Eg. Badtrans, Brontok etc.
E-mail Virus
 In Some attachments, Virus are hidden and you
Should have a virus scanner before you double So if
there is virus I the attachment, it would either won’t
let it open or make Sure the virus is eliminated
before opening.
E.g. ILOVEYou etc.
Macro Virus
 A Macro Virus is associated with application
Software like Word and excel. When opening the
infected document, macro Virus loaded into main
memory and destroys the data Stored in hard disk.
Eg. Relax, Melissa, A and Bablas, W97m etc.
Computer Crime Security and Privacy
Data communications capabilities provides new challenges
• Accidental damage
• Destruction
• Espionage
Keep data
secure
• Medical information
• Salaries
• Bank balances
Keep data
private
Virus Precautions
 Be wary of free software from the Internet
or friends
 Only install programs from diskettes in
sealed packages
 Use virus-scanning software to check any
file or document before loading it onto
your hard disk
Privacy How Did They Get My Data?
• Loans
• Orders via mail
• Magazine subscriptions
• Tax forms
• Applications for schools, jobs, clubs
• Hospital stay
• Advertisers
• Military draft registration
Privacy Legislation
Fair Credit Reporting
Act – 1970
Freedom of
Information Act –
1970
Federal Privacy Act –
1974
Video Privacy Protection act –
1988
Computer Matching and Privacy
Protections Act – 1988
Prevention
• Use antivirus software
• Be aware of the e-mails and attachments
you open
• Check for updates on antivirus software
regularly
• Make sure antivirus software is installed
correctly
Signs Your Computer is Infected
• Functions slower than normal
• Responds slowly and freezes often
• Restarts itself often
• See uncommon error messages,
distorted menus, and dialog boxes
• Notice applications fail to work
correctly
• Fail to print correctly
Computer Virus History
 First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources,
slowing down the productivity.
 -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the
system.
 Early 80,s-Increasing number of programs written by individuals not by software companies.
Programs caused miner viruses called "Trojan horses".
 1986'Brain virus' - by Amjad and Basit Farooq Alvi.
- spread through floppy disks,
- infected boot records and not computer hard drives
Computer Virus History
 Lahore, Pakistani Brain, Brain-A and UIUC virus
-took over free space on the floppy disk and hid from detection
”disguised itself by displaying the uninfected boot sector on the disk.”
 1987-Lehigh virus
- the first memory resident file infector that attacked executable files and took control when a
file was opened
 The Jerusalem Virus
-had bugs that re-infected programs that were already infected
 1988: Robert Morris made a worm that invaded ARPANET computers
- disabled 6,000 computers on the network by overflowing their memory banks with copies of
itself
 1991: Norton Anti-Virus software
 1999: "Melissa" virus
Contd…
- infected thousands of computers very fast by sending copies of itself to 50 names in the address
book on Outlook e-mail
- Led to an estimated $80 million in damage and record sales of anti-virus products.
 2000: "I Love You" virus
- was sent by email and infected 10 % of computers in only one day
- created by a young Filipino computer student who did not get punished because then the
Philippines had no laws against hacking which led to the European Union's global
Cybercrime Treaty.
 2001: "Nimda" virus (days after 9/11)
- had 5 ways of infecting systems
 2004
– My Doom spreads through emails and file-sharing software faster than any previous virus or
worm.
– Allows hackers to access the hard drive of the infected computer.
– An estimated one million computers running Windows are affected by the fast-spreading
Sasser computer worm.
Contd…
 The worm does not cause irreparable harm to computers or data, but it does slow computers
and cause some to quit or reboot without explanation.
 2006
– Discovery of the first-ever malware trojan horse for Mac OS X
 2008
– Torpig is a Trojan horse which affects Windows, turning off anti-virus applications.
■ It allows others to access the computer, modifies data, steals confidential information
and installs malware on the victim's computer.
 2009
– Conficker infects anywhere from 9 to 15 million Microsoft server systems.
– French air force, Royal Navy warships and submarines, Sheffield Hospital
network, UK Ministry of Defence, German Bundeswehr and Norwegian Police
were all affected.
Total Number of Viruses by year
1985 2
1987 3
1989 6
1990 142
1991 357
1992 1,161
1993 2,482
1994 3,687
1995 5,626
1996 7,764
1997 11,037
1998 16,726
1999 40,850
2000 44,000
2001 48,000
2002 55,000
2003 62,000
How to Make Your Home Machine As Secure As at Work
• Make sure your computer has good strong passwords
• Passwords should not be dictionary words and should consist of 7+
characters of mixed case including numbers, letters, and symbols.
• Patch your machine regularly
• Install an anti-spyware product
• Use an anti-virus product and update it regularly
• Use a router-based firewall Know what is running on your system
• Use good internet hygiene
Password Security
Hash
Function
Hashed
Password
Salt
Compare
Password
Client
Password
Server
Stored Password
Hashed
Password
Allow/Deny Access
• Password hashed and stored
– Salt added to randomize password & stored on system
• Password attacks launched to crack encrypted password
http://www.albany.edu/~goel/classes/spring2004/msi604/resources.shtml
Steps to help remove a virus
• Visit web site 4 Update and install the latest updates.
• If you currently use antivirus software, visit the manufacturer's Web site,
update your software, and then perform a thorough scan of your computer.
If you don't use antivirus software, subscribe to a service and scan your
computer immediately.
• Download, install, and run the Malicious Software Removal Tool (for
Microsoft Windows XP or Windows 2000 users).
 How to Protect a computer from Viruses
Securing The Computer From Viruses ...

More Related Content

What's hot

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
Faith Zeller
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
Dom Mike
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Malware
MalwareMalware
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
Kudzai Rerayi
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
Karwan Mustafa Kareem
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
VishwarajYadav
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
Damian T. Gordon
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
Tami Brass
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
Fathoni Mahardika II
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
hassanmughal4u
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Adware
AdwareAdware
Adware
Avani Patel
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
Worm
WormWorm
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 

What's hot (20)

What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
information about virus
information about virusinformation about virus
information about virus
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Malware
MalwareMalware
Malware
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
What is malware
What is malwareWhat is malware
What is malware
 
Adware
AdwareAdware
Adware
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Worm
WormWorm
Worm
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 

Similar to Securing The Computer From Viruses ...

Computer Virus
Computer Virus Computer Virus
Computer Virus
Study Hub
 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
Saurav Mahapatra
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 
Computer virus
Computer virusComputer virus
Computer virus
rana_babar
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
sonykhan3
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
JoelGautham
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
shopnil786
 
Computer virus
Computer virusComputer virus
Computer virus
BGS Model Public School
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
Joy Chakraborty
 
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
mkgspsu
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
AyushJain628
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
Bhavesh soni
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Pankaj Kumawat
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
PritamSahoo16
 
Virus09
Virus09Virus09
Virus09
defler
 

Similar to Securing The Computer From Viruses ... (20)

Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Saurav vishwaraj pro
Saurav vishwaraj proSaurav vishwaraj pro
Saurav vishwaraj pro
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
anti_virus
anti_virusanti_virus
anti_virus
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
Virus09
Virus09Virus09
Virus09
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Securing The Computer From Viruses ...

  • 1. SECURING THE COMPUTER FROM VIRUSES SUBMITTED TO :- SUBMITTED BY :- Dr. Shiva Shukla Md.Mustafizur Rahman Assistant Professor M.Ed. 2nd Semester Department of Education Regd.No.-17mededu07 Central University of Punjab
  • 2. Contents… • What is a computer Virus? • Types of Computer Virus • Boot Sector Virus • Multipartite Virus • Worm Virus • E-mail Virus • Micro Virus • Computer crime Security and Privacy • Virus Precautions • Privacy How Did They Get My Data? • Privacy Legislation • Prevention • Signs Your Computer is Infected • Computer Virus History • How to Make Your Home Machine As Secure As at Work • Steps to help remove a virus • Total Number of virus by year • Password Security
  • 3. What is a Computer Virus? • A Computer Virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. • A computer Virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user Sending it over a network or the internet, or by carrying it on a removable medium such as a floppy disk Cd , or USB drive.
  • 4. Types of Computer Virus Boot Sector Virus Multipartite Virus Worm Virus E-mail Virus Macro Virus
  • 5. Boot Sector Virus  It is a Computer Virus designed to infect the boot of the disk. It modifies or replaces the executable program in the boot Sector of the disk preventing the computer from being able to boot or start up.  Eg. Disk Killer , Danish boot etc.
  • 6. Multipartite Virus  A hybrid of Boot Program / file Viruses. They infect program files and when the infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk. Eg. Invader, tequila etc.
  • 7. Worm Virus ■ A Computer Worm is a Self-replicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network and it may do so without any user intervention. It always cause harm to the network, if only by consuming bandwidth. Eg. Badtrans, Brontok etc.
  • 8. E-mail Virus  In Some attachments, Virus are hidden and you Should have a virus scanner before you double So if there is virus I the attachment, it would either won’t let it open or make Sure the virus is eliminated before opening. E.g. ILOVEYou etc.
  • 9. Macro Virus  A Macro Virus is associated with application Software like Word and excel. When opening the infected document, macro Virus loaded into main memory and destroys the data Stored in hard disk. Eg. Relax, Melissa, A and Bablas, W97m etc.
  • 10. Computer Crime Security and Privacy Data communications capabilities provides new challenges • Accidental damage • Destruction • Espionage Keep data secure • Medical information • Salaries • Bank balances Keep data private
  • 11. Virus Precautions  Be wary of free software from the Internet or friends  Only install programs from diskettes in sealed packages  Use virus-scanning software to check any file or document before loading it onto your hard disk
  • 12. Privacy How Did They Get My Data? • Loans • Orders via mail • Magazine subscriptions • Tax forms • Applications for schools, jobs, clubs • Hospital stay • Advertisers • Military draft registration
  • 13. Privacy Legislation Fair Credit Reporting Act – 1970 Freedom of Information Act – 1970 Federal Privacy Act – 1974 Video Privacy Protection act – 1988 Computer Matching and Privacy Protections Act – 1988
  • 14. Prevention • Use antivirus software • Be aware of the e-mails and attachments you open • Check for updates on antivirus software regularly • Make sure antivirus software is installed correctly
  • 15. Signs Your Computer is Infected • Functions slower than normal • Responds slowly and freezes often • Restarts itself often • See uncommon error messages, distorted menus, and dialog boxes • Notice applications fail to work correctly • Fail to print correctly
  • 16. Computer Virus History  First half of the 70'Late 60,s, early 70,s- "Rabbits" cloned themselves occupied system resources, slowing down the productivity.  -"The Creeper" capable of entering a network by itself and transferring a copy of itself to the system.  Early 80,s-Increasing number of programs written by individuals not by software companies. Programs caused miner viruses called "Trojan horses".  1986'Brain virus' - by Amjad and Basit Farooq Alvi. - spread through floppy disks, - infected boot records and not computer hard drives
  • 17. Computer Virus History  Lahore, Pakistani Brain, Brain-A and UIUC virus -took over free space on the floppy disk and hid from detection ”disguised itself by displaying the uninfected boot sector on the disk.”  1987-Lehigh virus - the first memory resident file infector that attacked executable files and took control when a file was opened  The Jerusalem Virus -had bugs that re-infected programs that were already infected  1988: Robert Morris made a worm that invaded ARPANET computers - disabled 6,000 computers on the network by overflowing their memory banks with copies of itself  1991: Norton Anti-Virus software  1999: "Melissa" virus
  • 18. Contd… - infected thousands of computers very fast by sending copies of itself to 50 names in the address book on Outlook e-mail - Led to an estimated $80 million in damage and record sales of anti-virus products.  2000: "I Love You" virus - was sent by email and infected 10 % of computers in only one day - created by a young Filipino computer student who did not get punished because then the Philippines had no laws against hacking which led to the European Union's global Cybercrime Treaty.  2001: "Nimda" virus (days after 9/11) - had 5 ways of infecting systems  2004 – My Doom spreads through emails and file-sharing software faster than any previous virus or worm. – Allows hackers to access the hard drive of the infected computer. – An estimated one million computers running Windows are affected by the fast-spreading Sasser computer worm.
  • 19. Contd…  The worm does not cause irreparable harm to computers or data, but it does slow computers and cause some to quit or reboot without explanation.  2006 – Discovery of the first-ever malware trojan horse for Mac OS X  2008 – Torpig is a Trojan horse which affects Windows, turning off anti-virus applications. ■ It allows others to access the computer, modifies data, steals confidential information and installs malware on the victim's computer.  2009 – Conficker infects anywhere from 9 to 15 million Microsoft server systems. – French air force, Royal Navy warships and submarines, Sheffield Hospital network, UK Ministry of Defence, German Bundeswehr and Norwegian Police were all affected.
  • 20. Total Number of Viruses by year 1985 2 1987 3 1989 6 1990 142 1991 357 1992 1,161 1993 2,482 1994 3,687 1995 5,626 1996 7,764 1997 11,037 1998 16,726 1999 40,850 2000 44,000 2001 48,000 2002 55,000 2003 62,000
  • 21. How to Make Your Home Machine As Secure As at Work • Make sure your computer has good strong passwords • Passwords should not be dictionary words and should consist of 7+ characters of mixed case including numbers, letters, and symbols. • Patch your machine regularly • Install an anti-spyware product • Use an anti-virus product and update it regularly • Use a router-based firewall Know what is running on your system • Use good internet hygiene
  • 22. Password Security Hash Function Hashed Password Salt Compare Password Client Password Server Stored Password Hashed Password Allow/Deny Access • Password hashed and stored – Salt added to randomize password & stored on system • Password attacks launched to crack encrypted password http://www.albany.edu/~goel/classes/spring2004/msi604/resources.shtml
  • 23. Steps to help remove a virus • Visit web site 4 Update and install the latest updates. • If you currently use antivirus software, visit the manufacturer's Web site, update your software, and then perform a thorough scan of your computer. If you don't use antivirus software, subscribe to a service and scan your computer immediately. • Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users).
  • 24.  How to Protect a computer from Viruses