SlideShare a Scribd company logo
1 of 12
WHAT IS A "VIRUS"?
Computer viruses are called viruses because they share some
of the traits of biological viruses.
A computer virus passes from computer to computer like
a biological virus passes from person to person.
BIOLOGICAL VIRUSES
• A biological virus is not a living thing
• A virus is a fragment of DNA inside a protective jacket
• A biological virus must inject its DNA into a cell
COMPUTER VIRUSES
• A computer virus must piggyback on top of some other program
or document in order to get executed
• Once it is running, it is then able to infect other programs or documents
WHAT IS A "VIRUS"?
VIRUS HISTORY
Traditional computer viruses were first widely seen in the late 1980s
Viruses took advantage of these three facts to create the first self-
replicating programs!
FIRST FACTOR
Spread of personal computers
SECOND FACTOR
Use of computer "bulletin boards"
THIRD FACTOR
The floppy disk
1. FILE INFECTORS VIRUSES
a. Embedded in program
b. Runs when program gets executed
c. Loads in memory
d. Cycle continues through sharing files
2. BOOT-SECTOR VIRUSES
a. Load viruses into memory
b. Infect the boot sector on floppy disks and hard disks
3. MACRO VIRUSES
a. Infects data files
b. Executed in embedded scripts
c. Inserts copies of itself into other documents
d. Spreads by sharing data files
CLASSES OF VIRUSES
1. Large size of today's programs (executable)
2. Operating systems now protect the boot sector
EXECUTABLE AND BOOT SECTOR VIRUSES
ARE NOT VERY THREATENING ANY MORE
CLASSES OF VIRUSES
E-MAIL VIRUSES
E-MAIL VIRUSES ARE THE LATEST INVENTION
1. Melissa Virus (March 1999)
a. Embedded into Word document
b. When opened, sent to first 50 email addresses in address book
c. Included a friendly note making it look harmless
d. If opened by any of the recipients, sent to another 50
addresses of the current recipient
1. The ILOVEYOU Virus (May 2000)
a. Attachment is a piece of code
b. When executed, sent itself to everyone in the address book
c. Corrupted files
ORIGINS
THREE REASONS PEOPLE CREATE VIRUSES
1. The same psychology that drives vandals and arsonists
2. The thrill of watching things destroyed
3. Bragging rights, or the thrill of doing it
FIGHTING VIRUSES
ANTIVIRUS PROGRAMS
- Norton Antivirus (Symantec)
- VirusScan (McAfee)
- F-Secure Anti-Virus (F-Secure)
No anti-viruses guarantee 100 percent protection from viruses!!!
1 I-Worm.Klez 96.49%
2 Win95.CIH 0.84%
3 I-Worm.BadtransII 0.52%
4 I-Worm.Hybris 0.30%
5 Trojan.PSW.Delf 0.24%
6 I-Worm.Sircam 0.21%
7 Win32.Elkern.c 0.16%
8 Macro.Word.Cap 0.13%
9 Win32.FunLove 0.09%
10 I-Worm.Magistr 0.07%
Position Name Number of occurrences
STATISTICS
STATISTICS
NUMBER OF INFECTED FILES BY COUNTRY, WITHIN THE LAST 30 DAYS
0-100
101-1000
1001-10,000
10,001-100,000
100,001+
Team7.ppt

More Related Content

Similar to Team7.ppt

How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
sankhadeep
 

Similar to Team7.ppt (20)

Viruses
VirusesViruses
Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
εργασια
εργασιαεργασια
εργασια
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

Team7.ppt

  • 1.
  • 2. WHAT IS A "VIRUS"? Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
  • 3. BIOLOGICAL VIRUSES • A biological virus is not a living thing • A virus is a fragment of DNA inside a protective jacket • A biological virus must inject its DNA into a cell COMPUTER VIRUSES • A computer virus must piggyback on top of some other program or document in order to get executed • Once it is running, it is then able to infect other programs or documents WHAT IS A "VIRUS"?
  • 4. VIRUS HISTORY Traditional computer viruses were first widely seen in the late 1980s Viruses took advantage of these three facts to create the first self- replicating programs! FIRST FACTOR Spread of personal computers SECOND FACTOR Use of computer "bulletin boards" THIRD FACTOR The floppy disk
  • 5. 1. FILE INFECTORS VIRUSES a. Embedded in program b. Runs when program gets executed c. Loads in memory d. Cycle continues through sharing files 2. BOOT-SECTOR VIRUSES a. Load viruses into memory b. Infect the boot sector on floppy disks and hard disks 3. MACRO VIRUSES a. Infects data files b. Executed in embedded scripts c. Inserts copies of itself into other documents d. Spreads by sharing data files CLASSES OF VIRUSES
  • 6. 1. Large size of today's programs (executable) 2. Operating systems now protect the boot sector EXECUTABLE AND BOOT SECTOR VIRUSES ARE NOT VERY THREATENING ANY MORE CLASSES OF VIRUSES
  • 7. E-MAIL VIRUSES E-MAIL VIRUSES ARE THE LATEST INVENTION 1. Melissa Virus (March 1999) a. Embedded into Word document b. When opened, sent to first 50 email addresses in address book c. Included a friendly note making it look harmless d. If opened by any of the recipients, sent to another 50 addresses of the current recipient 1. The ILOVEYOU Virus (May 2000) a. Attachment is a piece of code b. When executed, sent itself to everyone in the address book c. Corrupted files
  • 8. ORIGINS THREE REASONS PEOPLE CREATE VIRUSES 1. The same psychology that drives vandals and arsonists 2. The thrill of watching things destroyed 3. Bragging rights, or the thrill of doing it
  • 9. FIGHTING VIRUSES ANTIVIRUS PROGRAMS - Norton Antivirus (Symantec) - VirusScan (McAfee) - F-Secure Anti-Virus (F-Secure) No anti-viruses guarantee 100 percent protection from viruses!!!
  • 10. 1 I-Worm.Klez 96.49% 2 Win95.CIH 0.84% 3 I-Worm.BadtransII 0.52% 4 I-Worm.Hybris 0.30% 5 Trojan.PSW.Delf 0.24% 6 I-Worm.Sircam 0.21% 7 Win32.Elkern.c 0.16% 8 Macro.Word.Cap 0.13% 9 Win32.FunLove 0.09% 10 I-Worm.Magistr 0.07% Position Name Number of occurrences STATISTICS
  • 11. STATISTICS NUMBER OF INFECTED FILES BY COUNTRY, WITHIN THE LAST 30 DAYS 0-100 101-1000 1001-10,000 10,001-100,000 100,001+