SlideShare a Scribd company logo
1 of 12
B.ed First Year Session 2020-22
EPC 3-Criticial understanding of ICT
Name: Suraj Singh
Roll Number#2005
Computer Virus and its
management
Overview
What is computer Virus & its
historical prospective?
What are its various types?
How does it impact us?
How can we manage it?
A computer virus is a type of computer
program that, when executed,
replicates itself by modifying other
computer programs and inserting its
own code. If this replication succeeds,
the affected areas are then said to be
"infected" with a computer virus.
The first computer virus, called "Creeper system",
was an experimental self-
replicating virus released in 1971. It was filling up
the hard drive until a computer could not operate
any further. This virus was created by BBN
technologies in the US. The first computer
virus for MS-DOS was "Brain" and was released in
1986.
Resident vs. non-resident viruses
Macro viruses
Boot sector viruses
Email virus
A memory-resident virus (or simply "resident virus")
installs itself as part of the operating system when
executed, after which it remains in RAM from the time
the computer is booted up to when it is shut down.
Resident viruses overwrite interrupt handling code or
other functions, and when the operating system
attempts to access the target file or disk sector, the
virus code intercepts the request and redirects
the control flow to the replication module, infecting the
target
A macro virus (or "document virus") is a virus
that is written in a macro language and
embedded into these documents so that
when users open the file, the virus code is
executed, and can infect the user's computer.
This is one of the reasons that it is
dangerous to open unexpected or
suspicious attachments in e-mails
Boot sector viruses specifically target
the boot sector and/or the Master Boot
Record (MBR) of the host's hard disk
drive, solid-state drive, or removable
storage media (flash drives, floppy
disks, etc.).
Email viruses are viruses that intentionally, rather
than accidentally, uses the email system to spread.
While virus infected files may be accidentally sent
as email attachments, email viruses are aware of
email system functions. They generally target a
specific type of email system (Microsoft Outlook is
the most commonly used), harvest email addresses
from various sources, and may append copies of
themselves to all email sent, or may generate email
messages containing copies of themselves as
attachments
Install Anti-Virus/Malware Software.
Keep Your Anti-Virus Software Up to Date
Run Regularly Scheduled Scans with Your Anti-Virus
Software.
Keep Your Operating System Current.
Secure Your Network.
Think Before You Click.
Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Back Up Your Files.
Use Multiple Strong Passwords.
Thanks and Regards
Suraj Singh
B.Ed First Year
Roll# 2005

More Related Content

Similar to suraj singh Bed PPT(Computer Virus and its management).pptx

Similar to suraj singh Bed PPT(Computer Virus and its management).pptx (20)

DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Introduction to Computer Virus
Introduction to Computer VirusIntroduction to Computer Virus
Introduction to Computer Virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus
Computer virusComputer virus
Computer virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
As computer virus
As computer virusAs computer virus
As computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 

More from DEEP TIWARI

PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxPRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxDEEP TIWARI
 
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptPiaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptDEEP TIWARI
 
ewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxDEEP TIWARI
 
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTPRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTDEEP TIWARI
 
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxMadhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxDEEP TIWARI
 
business management project on new topic
business management project on new topicbusiness management project on new topic
business management project on new topicDEEP TIWARI
 
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxKHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxDEEP TIWARI
 
deepchandtiwari.pptx
deepchandtiwari.pptxdeepchandtiwari.pptx
deepchandtiwari.pptxDEEP TIWARI
 
REHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfREHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfDEEP TIWARI
 
PF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxPF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxDEEP TIWARI
 
Time tableexam 2018
Time tableexam 2018Time tableexam 2018
Time tableexam 2018DEEP TIWARI
 

More from DEEP TIWARI (12)

PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptxPRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
 
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).pptPiaget theory by yashjmmnmn,mjhgaizz (1).ppt
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
 
ewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptxewrewr rerwerwer erwerwe werew werwer.pptx
ewrewr rerwerwer erwerwe werew werwer.pptx
 
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPTPRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
 
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptxMadhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
 
business management project on new topic
business management project on new topicbusiness management project on new topic
business management project on new topic
 
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptxKHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
 
deepchandtiwari.pptx
deepchandtiwari.pptxdeepchandtiwari.pptx
deepchandtiwari.pptx
 
REHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdfREHAN NAWAZ KHAN_CV.pdf
REHAN NAWAZ KHAN_CV.pdf
 
PF_Declartion_Form (1).docx
PF_Declartion_Form (1).docxPF_Declartion_Form (1).docx
PF_Declartion_Form (1).docx
 
Cala
CalaCala
Cala
 
Time tableexam 2018
Time tableexam 2018Time tableexam 2018
Time tableexam 2018
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

suraj singh Bed PPT(Computer Virus and its management).pptx

  • 1. B.ed First Year Session 2020-22 EPC 3-Criticial understanding of ICT Name: Suraj Singh Roll Number#2005
  • 2. Computer Virus and its management
  • 3. Overview What is computer Virus & its historical prospective? What are its various types? How does it impact us? How can we manage it?
  • 4. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
  • 5. The first computer virus, called "Creeper system", was an experimental self- replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
  • 6. Resident vs. non-resident viruses Macro viruses Boot sector viruses Email virus
  • 7. A memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down. Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target
  • 8. A macro virus (or "document virus") is a virus that is written in a macro language and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer. This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails
  • 9. Boot sector viruses specifically target the boot sector and/or the Master Boot Record (MBR) of the host's hard disk drive, solid-state drive, or removable storage media (flash drives, floppy disks, etc.).
  • 10. Email viruses are viruses that intentionally, rather than accidentally, uses the email system to spread. While virus infected files may be accidentally sent as email attachments, email viruses are aware of email system functions. They generally target a specific type of email system (Microsoft Outlook is the most commonly used), harvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments
  • 11. Install Anti-Virus/Malware Software. Keep Your Anti-Virus Software Up to Date Run Regularly Scheduled Scans with Your Anti-Virus Software. Keep Your Operating System Current. Secure Your Network. Think Before You Click. Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Back Up Your Files. Use Multiple Strong Passwords.
  • 12. Thanks and Regards Suraj Singh B.Ed First Year Roll# 2005