SlideShare a Scribd company logo
1 of 21
VIRUS & ANTI-VIRUS
VS
GROUP MEMBERS:
Shazaib Malik
2019-BT-CIVL-02
M Abdullah
2019-BT –CIVIL-10
M Shazaib
2019-BT-CIVIL-05
M Faisal H Q
2019-BT-CIVIL-26
CONTENT:
VIRUS:
 WHAT IS A COMPUTER VIRUS.
 HOW IT IS WORK.
 TYPES OF VIRUS.
 EXPLAIN THE TYPES OF VIRUSES.
 DISADVANTAGES.
ANATI-VIRUS:
 WHAT IS A COMPUTER ANTI-VIRUS.
 HOW IT IS WORK.
 TYPES OF VIRUS.
 EXPLAIN THE TYPES OF ANTI-VIRUSES.
 ADVANTAGES.
WHAT IS A COMPUTER VIRUS:
 Computer Viruses are small software programs that are
designed to spread from one computer to another and to
interfere with computer operation.
HOW IT IS WORK:
 A virus is a small piece of software that piggybacks on real programs.
For example, a virus might attach itself to a program such as a
spreadsheet program. Each time the spreadsheet program runs,
the virus runs, too, and it has the chance to reproduce (by attaching to
other programs) or wreak havoc
WHAT IS A COMPUTER ANTI-
VIRUS:
 An antivirus software is a computer
program that identifies and removes
computer viruses, and other malicious
software like Worms and Trojans from
an infected computer. Not only this, an
antivirus software also protects the
computer from further virus attacks.
HOW IT IS WORK:
 The antivirus software examines each
and every file in a computer.
 It also examines its content with the virus
definitions stored in its virus dictionary.
 A virus dictionary is an inbuilt file belonging
to an antivirus software that contains code identified
as a virus by the antivirus authors.
TYPES OF VIRUSES:
 Trojan Horse
 Boot Sector Virus.
 Worms.
 Polymorphic virus.
 Macro virus.
 Memory Resident Virus
EXPLAIN
THE
TYPES
OF
VIRUSES:
Trojan Horse:
 A Trojan is a program file that claims to
do something but it actually does something
that is not required. Trojans can be employed
by cyber-thieves and hackers trying to gain
access to users' systems. Users are typically
tricked by some form of social engineering into
loading and executing Trojans on their systems.
Boot Sector Virus:
 The boot sector virus copies the
virus code in the boot sector and that infects
a storage device's master boot record (MBR).
It is not mandatory that a boot sector virus
Successfully boot the victim's PC to infect it.
As a result, even non-bootable media can
trigger the spread of boot sector viruses.
Worms:
 Worms are program that replicate
and spread to other system. Worms
almost always cause at least some harm
to the network, even if only by consuming
bandwidth., whereas viruses almost always
corrupt or modify files on a targeted computer.
TYPES OF ANTI-VIRUS:
AVG
MCAFEE
NORTON
KASPERSKY
AD-AWARE
EXPLAIN
THE
TYPES
OF
VIRUSES.
AVG ANTI-VIRUS:
 AVG is one of the most popular antivirus
programs. It can also work with a number
of different Windows operating systems. It
Is scanning all the files on the computer at
regular intervals. Additionally, it has the
ability to quarantine virus files so that they
cannot do any harm before they can be
checked and deleted.
McAfee ANTI-VIRUS:
 McAfee Virus Scan has been another very
popular antivirus program on the market for
years. It is necessary to take out a subscription
to use McAfee, but it will give you access to
continuously updating virus protection.
NORTON ANTI-VIRUS:
 Norton programs are used by the majority of
computer users on the market, who pay an annual
fee for a subscription service. Norton Anti-Virus
and Norton Internet Security are software programs
that search the computer regularly and delete any
viruses that they find.
DISADVANTAGES OF VIRUS:
• Viruscancrashwindow.
• Viruscanremovewindowfilesduetothisthecomputersystemslow
down.
• viruscanstolethevaluabledataofyourcomputer.
• Duetosomevirusthehardwareofcomputersystemcannotwork
properly.
ADVANTAGES OF ANTI-VIRUS:
Protection from Viruses & Spyware. ...
Protection from Phishing Attacks. ...
Provides Robust Web Protection. ...
Provides quick scan of removable device. ...
Two-Way Firewall. ...
Block Ads and Spam Website. ...
Provides Password Protection. ...
Parental Control.
REFERENCES:
 WWW.GOOGLE.COM
 SLIDE SHARE WEB
 TECHWAL.COM
 WIKIPEDIA
 The Art of Deception. Kevin D. Mitnick. ...
 Sandworm. Andy Greenberg. 05 Nov 2019. ...
 Black Hat Python. Justin Seitz. 21 Jan 2015. …
Viruses vs Antivirus Software

More Related Content

What's hot

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran universityRebaz Hamad
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarsasikumr sagabala
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentationRohit Kashyap
 

What's hot (20)

Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Virus soran university
Virus  soran universityVirus  soran university
Virus soran university
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumarComputer viruses and anti viruses by sasikumar
Computer viruses and anti viruses by sasikumar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
computer viruses power point presentation
computer viruses power point presentationcomputer viruses power point presentation
computer viruses power point presentation
 

Similar to Viruses vs Antivirus Software

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirussinghhp10699
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxbmokemane4
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 

Similar to Viruses vs Antivirus Software (20)

11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
information about virus
information about virusinformation about virus
information about virus
 
Virus
VirusVirus
Virus
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Malware
MalwareMalware
Malware
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
Computer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptxComputer_Virus_and_Anti_virus.pptx
Computer_Virus_and_Anti_virus.pptx
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation2
Presentation2Presentation2
Presentation2
 

Recently uploaded

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 

Recently uploaded (20)

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 

Viruses vs Antivirus Software

  • 2. GROUP MEMBERS: Shazaib Malik 2019-BT-CIVL-02 M Abdullah 2019-BT –CIVIL-10 M Shazaib 2019-BT-CIVIL-05 M Faisal H Q 2019-BT-CIVIL-26
  • 3. CONTENT: VIRUS:  WHAT IS A COMPUTER VIRUS.  HOW IT IS WORK.  TYPES OF VIRUS.  EXPLAIN THE TYPES OF VIRUSES.  DISADVANTAGES. ANATI-VIRUS:  WHAT IS A COMPUTER ANTI-VIRUS.  HOW IT IS WORK.  TYPES OF VIRUS.  EXPLAIN THE TYPES OF ANTI-VIRUSES.  ADVANTAGES.
  • 4. WHAT IS A COMPUTER VIRUS:  Computer Viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
  • 5. HOW IT IS WORK:  A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc
  • 6. WHAT IS A COMPUTER ANTI- VIRUS:  An antivirus software is a computer program that identifies and removes computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks.
  • 7. HOW IT IS WORK:  The antivirus software examines each and every file in a computer.  It also examines its content with the virus definitions stored in its virus dictionary.  A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 8. TYPES OF VIRUSES:  Trojan Horse  Boot Sector Virus.  Worms.  Polymorphic virus.  Macro virus.  Memory Resident Virus
  • 10. Trojan Horse:  A Trojan is a program file that claims to do something but it actually does something that is not required. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
  • 11. Boot Sector Virus:  The boot sector virus copies the virus code in the boot sector and that infects a storage device's master boot record (MBR). It is not mandatory that a boot sector virus Successfully boot the victim's PC to infect it. As a result, even non-bootable media can trigger the spread of boot sector viruses.
  • 12. Worms:  Worms are program that replicate and spread to other system. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth., whereas viruses almost always corrupt or modify files on a targeted computer.
  • 15. AVG ANTI-VIRUS:  AVG is one of the most popular antivirus programs. It can also work with a number of different Windows operating systems. It Is scanning all the files on the computer at regular intervals. Additionally, it has the ability to quarantine virus files so that they cannot do any harm before they can be checked and deleted.
  • 16. McAfee ANTI-VIRUS:  McAfee Virus Scan has been another very popular antivirus program on the market for years. It is necessary to take out a subscription to use McAfee, but it will give you access to continuously updating virus protection.
  • 17. NORTON ANTI-VIRUS:  Norton programs are used by the majority of computer users on the market, who pay an annual fee for a subscription service. Norton Anti-Virus and Norton Internet Security are software programs that search the computer regularly and delete any viruses that they find.
  • 18. DISADVANTAGES OF VIRUS: • Viruscancrashwindow. • Viruscanremovewindowfilesduetothisthecomputersystemslow down. • viruscanstolethevaluabledataofyourcomputer. • Duetosomevirusthehardwareofcomputersystemcannotwork properly.
  • 19. ADVANTAGES OF ANTI-VIRUS: Protection from Viruses & Spyware. ... Protection from Phishing Attacks. ... Provides Robust Web Protection. ... Provides quick scan of removable device. ... Two-Way Firewall. ... Block Ads and Spam Website. ... Provides Password Protection. ... Parental Control.
  • 20. REFERENCES:  WWW.GOOGLE.COM  SLIDE SHARE WEB  TECHWAL.COM  WIKIPEDIA  The Art of Deception. Kevin D. Mitnick. ...  Sandworm. Andy Greenberg. 05 Nov 2019. ...  Black Hat Python. Justin Seitz. 21 Jan 2015. …