SlideShare a Scribd company logo
1 of 30
AND
ITS TYPES
What is a Virus on a
computer?
•
•
What is a Virus on a
computer?
•
• A virus is simply a computer program--
it can do anything that any other
program you run on your computer can
do. Some viruses are designed to
deliberately damage files, and others
may just spread to other computers.
Do you wonder..
• Viruses infect computers discreetly, and they’re
often designed to destroy personal files or gain
control of devices. Making copies of themselves,
computer viruses spread across devices and
networks like biological viruses passing from one
person to the next. And just like the biological
versions, some computer viruses are simply
annoying while others can cause major damage.
• In the early days of computers, viruses were spread between
devices using floppy disks. It spread through almost any method of
file sharing, as long as the virus can avoid detection by antivirus
programs.
• Nowadays, viruses can still be spread via hard disks and Universal Serial Bus
(USB) devices, but they are more likely to be passed between devices
through the internet and by malicious online downloads.
• Computer viruses can be spread via email, with some even capable of
hijacking email software to spread themselves. Others may attach to
legitimate software, within software packs, or infect code, and other
viruses can be downloaded from compromised application stores.
•
•
•
•
•
• Slow or stuttering performance
• Corrupted or deleted files
• Incessant pop-ups or adware
• Program failure and operating system crashes
• A constantly spinning hard drive
• Malfunctioning apps, files, and other programs
• Steal personal data — such as usernames, passwords, and credit card details
• Spam all of your contacts and try to trick them into downloading the virus
Common Types of Computer
Viruses
1. File-infecting Virus
A virus that attached itself to an executable program.
Itisalsocalledaparasiticviruswhichtypicallyinfects
files with .exe or .com extensions. Some file infectors
can overwrite host files and others can damage your
harddrive’sformatting.
2. Macro Virus
This type of virus is commonly found in programs such
as Microsoft Word or Excel. These viruses are usually
stored as part of a document and can spread when the
files are transmitted to other computers, often through
emailattachments.
3. Browser Hijacker
This virus targets and alters your browser setting. It is
often called a browser redirect virus because it
redirects your browser to other malicious websites
thatyoudon’thaveanyintentionofvisiting.Thisvirus
can pose other threats such as changing the default
homepageofyourbrowser.
4.Web Scripting Virus
A very sneakyvirusthattargetspopularwebsites.What
this virus does is overwrite code on a website and insert
links that can install malicious software on your device.
Webscriptingvirusescanstealyourcookiesandusethe
information to post on your behalf on the infected
website.
5. Boot Sector Virus
These viruses are once common back when computers are
booted from floppy disks. Today, these viruses are found
distributed in forms of physical media such as external hard
drives or USB. If the computer is infected with a boot sector
virus, it automatically loads into the memory enabling
controlofyourcomputer.
6. Polymorphic Virus
This virus has the capability to evade anti-
virus programs since it can change codes
everytimeaninfectedfileisperformed.
7. Resident Virus
A resident virus stores itself on your computer’s
memory which allows it to infect files on your
computer. This virus can interfere with your
operating system leading to file and program
corruption.
8. Multipartite Virus
A type of virus that is very infectious and can easily
spread on your computer system. It can infect multiple
parts of a system including memory, files, and boot
sectorwhichmakesitdifficulttocontain.
• Worm
• ILOVEYOU
• Stuxnet
• Welchia
• Tinba
• A computer worm is a type of trojan horse
malware that, unlike traditional viruses,
does not require the user's intervention to
spread from device to device. After
breaching a system, it can spread from one
computer to another without human
intervention.
• The ILOVEYOU virus is an overwrite virus. This
virus disguised itself as a love letter from one of its
victims' contacts and spread via email.
• It was the most damaging malware event of all time
when it occurred in 2000. In just about 10 days, it
reached an estimated 45 million users and caused
$10 billion in damages.
• Stuxnet is a highly sophisticated
computer worm that was designed to
attack Iran's nuclear facilities but has
since mutated and spread to other
industrial and energy-producing
facilities.
• The Welchia worm, also known as Nachi, is
a Nematode that deletes Blaster and fixes
the vulnerabilities that allow them to exist.
While it has no malicious intent, it does tend
to slow down computers and networks. On
August 18th, 2003, it was first reported.
• Tinba is a trojan that infects end-user
devices and attempts to compromise and
steal funds from their financial accounts.
The Trojan was discovered in 2012 and
initially infected thousands of Turkish
computers.
THANK YOU FOR
LISTENING!!
We hope you
learned something new.

More Related Content

Similar to TLE ICT 10 Q3 - VIRUS and its Types.pptx

Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 

Similar to TLE ICT 10 Q3 - VIRUS and its Types.pptx (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus.pptx
Virus.pptxVirus.pptx
Virus.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer virus
Computer virusComputer virus
Computer virus
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Worm
WormWorm
Worm
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

TLE ICT 10 Q3 - VIRUS and its Types.pptx

  • 2. What is a Virus on a computer? • •
  • 3. What is a Virus on a computer? •
  • 4. • A virus is simply a computer program-- it can do anything that any other program you run on your computer can do. Some viruses are designed to deliberately damage files, and others may just spread to other computers. Do you wonder..
  • 5. • Viruses infect computers discreetly, and they’re often designed to destroy personal files or gain control of devices. Making copies of themselves, computer viruses spread across devices and networks like biological viruses passing from one person to the next. And just like the biological versions, some computer viruses are simply annoying while others can cause major damage.
  • 6. • In the early days of computers, viruses were spread between devices using floppy disks. It spread through almost any method of file sharing, as long as the virus can avoid detection by antivirus programs. • Nowadays, viruses can still be spread via hard disks and Universal Serial Bus (USB) devices, but they are more likely to be passed between devices through the internet and by malicious online downloads. • Computer viruses can be spread via email, with some even capable of hijacking email software to spread themselves. Others may attach to legitimate software, within software packs, or infect code, and other viruses can be downloaded from compromised application stores.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. • Slow or stuttering performance • Corrupted or deleted files • Incessant pop-ups or adware • Program failure and operating system crashes • A constantly spinning hard drive • Malfunctioning apps, files, and other programs • Steal personal data — such as usernames, passwords, and credit card details • Spam all of your contacts and try to trick them into downloading the virus
  • 15. Common Types of Computer Viruses
  • 16. 1. File-infecting Virus A virus that attached itself to an executable program. Itisalsocalledaparasiticviruswhichtypicallyinfects files with .exe or .com extensions. Some file infectors can overwrite host files and others can damage your harddrive’sformatting.
  • 17. 2. Macro Virus This type of virus is commonly found in programs such as Microsoft Word or Excel. These viruses are usually stored as part of a document and can spread when the files are transmitted to other computers, often through emailattachments.
  • 18. 3. Browser Hijacker This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites thatyoudon’thaveanyintentionofvisiting.Thisvirus can pose other threats such as changing the default homepageofyourbrowser.
  • 19. 4.Web Scripting Virus A very sneakyvirusthattargetspopularwebsites.What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Webscriptingvirusescanstealyourcookiesandusethe information to post on your behalf on the infected website.
  • 20. 5. Boot Sector Virus These viruses are once common back when computers are booted from floppy disks. Today, these viruses are found distributed in forms of physical media such as external hard drives or USB. If the computer is infected with a boot sector virus, it automatically loads into the memory enabling controlofyourcomputer.
  • 21. 6. Polymorphic Virus This virus has the capability to evade anti- virus programs since it can change codes everytimeaninfectedfileisperformed.
  • 22. 7. Resident Virus A resident virus stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.
  • 23. 8. Multipartite Virus A type of virus that is very infectious and can easily spread on your computer system. It can infect multiple parts of a system including memory, files, and boot sectorwhichmakesitdifficulttocontain.
  • 24. • Worm • ILOVEYOU • Stuxnet • Welchia • Tinba
  • 25. • A computer worm is a type of trojan horse malware that, unlike traditional viruses, does not require the user's intervention to spread from device to device. After breaching a system, it can spread from one computer to another without human intervention.
  • 26. • The ILOVEYOU virus is an overwrite virus. This virus disguised itself as a love letter from one of its victims' contacts and spread via email. • It was the most damaging malware event of all time when it occurred in 2000. In just about 10 days, it reached an estimated 45 million users and caused $10 billion in damages.
  • 27. • Stuxnet is a highly sophisticated computer worm that was designed to attack Iran's nuclear facilities but has since mutated and spread to other industrial and energy-producing facilities.
  • 28. • The Welchia worm, also known as Nachi, is a Nematode that deletes Blaster and fixes the vulnerabilities that allow them to exist. While it has no malicious intent, it does tend to slow down computers and networks. On August 18th, 2003, it was first reported.
  • 29. • Tinba is a trojan that infects end-user devices and attempts to compromise and steal funds from their financial accounts. The Trojan was discovered in 2012 and initially infected thousands of Turkish computers.
  • 30. THANK YOU FOR LISTENING!! We hope you learned something new.