SlideShare a Scribd company logo
1 of 14
Security Threats and Trends
Module:1
Topic-2:Types of Viruses
By,
Neha Raju K
Assistant Professor
BCA-Cloud Technology and
Information Security Management
CONTENTS
Types Of VirusesSymptoms of Computer
Viruses and Worms
Symptoms
• Unexpected pop-up windows.
• Unexpected onscreen ads are a typical sign of a virus infection.
• Slow start up and slow performance.
• Suspicious hard drive activity.
• Lack of storage space.
• Missing files.
• Crashes and error messages.
Types of Viruses
• Resident Virus
• Direct Action Virus
• Overwrite Virus
• Boot Virus
• Macro Virus
• Directory Virus
• File Infectors
• Companion Virus
• Polymorphic Virus,etc.
Resident Virus
File to be
executed Infected file
processing
Direct Action
Virus
• This is also called non-resident virus, it gets
installed or stays hidden in
the computer memory.
• It stays attached to the specific type of
files(.exe) that it infect. It does not affect the
user experience and system's performance.
• EX: Vienna virus (variants: Vienna.Choinka,
Vienna.Gympel, Iraqui Warrior,
Vienna.Lisbon,etc.
Overwrite Virus
• Virus of this kind is characterised by the fact
that it deletes the information contained in the
files that it infects.
• The only way to clean a file infected by an
overwrite virus is to delete the file completely,
thus losing the original content.
• Examples of this virus include: Way, Trj.Reboot,
Trivial.88.D.
Boot Virus
• This type of virus affects the boot sector of a floppy or
hard disk.
• This is a crucial part of a disk, in which information on the
disk itself is stored together with a program that makes it
possible to boot (start) the computer from the disk.
• The best way of avoiding boot viruses is to ensure that
floppy disks are write-protected and never start your
computer with an unknown floppy disk in the disk drive.
• Examples of boot viruses include: Polyboot.B, AntiEXE,
Form, Disk Killer, Michelangelo and Stone virus
Macro Virus
• A MAC or Macro virus is a computer virus that
spreads to other computers through software
programs that utilize macros.
• For example, Microsoft Word and Microsoft Excel
are two popular and widely used programs that
are capable of executing macros.
• Examples of macro viruses: Relax Melissa.A, Bablas
and O97M/Y2K.
Directory Virus
• Directory viruses change the paths that indicate
the location of a file.
• By executing a program (file with the extension
.EXE or .COM) which has been infected by a
virus, you are unknowingly running the virus
program, while the original file and program
have been previously moved by the virus.
• Once infected it becomes impossible to locate
the original files.
File Infectors
• This type of virus infects programs or
executable files (files with an .EXE or
.COM extension).
• The majority of existing viruses belongs
to this category and can be classified
depending on the actions that they
carry out.
Companion Virus
• Companion virus can be considered as file infector
virus like resident or direct action types.
• They are known as companion viruses because
once they get into the system they accompany the
other files that already exist.
• Some examples include: Stator, Asimov. 1539 and
Terrax. 1069
Polymorphic Virus
• Polymorphic viruses encrypt or encode
themselves in a different way (using different
algorithms and encryption keys) every time
they infect a system.
• This makes it impossible for anti-viruses to find
them using string or signature searches
(because they are different in each encryption)
and also enables them to create a large number
of copies of themselves.
• Examples include: Elkern, Marburg, Satan Bug
and Tuareg.
Thank You

More Related Content

What's hot

Computer Virus
Computer VirusComputer Virus
Computer VirusAritra Das
 
Computer virus
Computer virusComputer virus
Computer virusarif srk
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | ExplainationBipulok
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer wormsjyoti_lakhani
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)allisterm
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virusYouQue ™
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Computer Virus
Computer Virus Computer Virus
Computer Virus Study Hub
 

What's hot (20)

Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Worm
WormWorm
Worm
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 

Similar to Security threats and trends-topic 2

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virusXʎz ʞsɥ
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus tayyaba rashid
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxglainAE
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Similar to Security threats and trends-topic 2 (20)

Virus vs anti virus
Virus vs anti virusVirus vs anti virus
Virus vs anti virus
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
TLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptxTLE ICT 10 Q3 - VIRUS and its Types.pptx
TLE ICT 10 Q3 - VIRUS and its Types.pptx
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Security threats and trends-topic 2

  • 1. Security Threats and Trends Module:1 Topic-2:Types of Viruses By, Neha Raju K Assistant Professor BCA-Cloud Technology and Information Security Management
  • 2. CONTENTS Types Of VirusesSymptoms of Computer Viruses and Worms
  • 3. Symptoms • Unexpected pop-up windows. • Unexpected onscreen ads are a typical sign of a virus infection. • Slow start up and slow performance. • Suspicious hard drive activity. • Lack of storage space. • Missing files. • Crashes and error messages.
  • 4. Types of Viruses • Resident Virus • Direct Action Virus • Overwrite Virus • Boot Virus • Macro Virus • Directory Virus • File Infectors • Companion Virus • Polymorphic Virus,etc.
  • 5. Resident Virus File to be executed Infected file processing
  • 6. Direct Action Virus • This is also called non-resident virus, it gets installed or stays hidden in the computer memory. • It stays attached to the specific type of files(.exe) that it infect. It does not affect the user experience and system's performance. • EX: Vienna virus (variants: Vienna.Choinka, Vienna.Gympel, Iraqui Warrior, Vienna.Lisbon,etc.
  • 7. Overwrite Virus • Virus of this kind is characterised by the fact that it deletes the information contained in the files that it infects. • The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content. • Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
  • 8. Boot Virus • This type of virus affects the boot sector of a floppy or hard disk. • This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. • The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. • Examples of boot viruses include: Polyboot.B, AntiEXE, Form, Disk Killer, Michelangelo and Stone virus
  • 9. Macro Virus • A MAC or Macro virus is a computer virus that spreads to other computers through software programs that utilize macros. • For example, Microsoft Word and Microsoft Excel are two popular and widely used programs that are capable of executing macros. • Examples of macro viruses: Relax Melissa.A, Bablas and O97M/Y2K.
  • 10. Directory Virus • Directory viruses change the paths that indicate the location of a file. • By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. • Once infected it becomes impossible to locate the original files.
  • 11. File Infectors • This type of virus infects programs or executable files (files with an .EXE or .COM extension). • The majority of existing viruses belongs to this category and can be classified depending on the actions that they carry out.
  • 12. Companion Virus • Companion virus can be considered as file infector virus like resident or direct action types. • They are known as companion viruses because once they get into the system they accompany the other files that already exist. • Some examples include: Stator, Asimov. 1539 and Terrax. 1069
  • 13. Polymorphic Virus • Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. • This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves. • Examples include: Elkern, Marburg, Satan Bug and Tuareg.