SlideShare a Scribd company logo
Topics:
Virus
Types of virus
Malware
Types of Malware
Difference B/W virus and malware
 How can we protect pc from viruses and
malwares.
What is Virus?
• A computer virus is a program, script or macro
designed to cause damage, steal personal
information, modify data, send e-mail, display
messages or some combination of these action.
• A computer virus is much like flu virus, is
designed to spread from host to host and has the
ability to replicate itself.
• Similarly in the same way that viruses cannot
produce without a host cell.
Continue:
• Virus is program or piece of code that is
loaded onto your computer without your
knowledge and runs against your wishes.
• When the virus is execute, it spread by
copying itself over data files, programs or boot
sector of computers hard drive or potentially
any thing else writeable.
Continue:
• To help spread an infection the virus writers
use detailed knowledge of security
vulnerabilities, zero days or social engineering
to gain access to hosts computers..
Types of virus:
1. Boot Sector Virus:
• From a user perspective, boot sector viruses
are some of the most dangerous.
• Because they infect the master boot record,
they are notoriously difficult to remove, often
requiring a full system format.
• They typically spread via removable media.
2. Direct Action Virus:
• A direct action virus is one of the two main
types of file infector viruses.
• It works by attaching itself to a particular type
of file.
• When someone executes the file, it springs
into life, looking for other similar files in the
directory for it to spread to.
3. Resident Virus:
• Resident viruses are the other primary type of
file infectors.
• they install themselves on a computer.
• It allows them to work even when the original
source of the infection has been eradicated.
4. Macro Virus:
• This is type of file based virus.
• It attaches to files made from programs that
support macros.
• Some examples are Microsoft Excel and Word,
and people often unknowingly download
them from email attachments.
• A good security program scans these types of
files before you download them to detect any
threats.
5. FAT Virus:
• FAT viruses ruin your file allocation system,
which is where information about files and
where to find them exists.
• It even destroys files and the entire directories
for them.
Malware
• Malware is an abbreviated term meaning
“malicious software”.
• This is software that is specifically designed to
gain access or damage a computer without
the knowledge of the owner.
• Malware is a file or code typically delivered
over a network, that infects, explores, steals
or conduct virtually any behavior an attacker
wants.
Continue:
• Malware usually has one of the following
objectives:
• Provide remote control for an attacker to use
an infected machine.
• Send spam from the infected machine to
unsuspecting targets.
• Steal sensitive data.
Types of Malware:
1. Adware:
• Adware is a type of malware that
automatically delivers advertisements.
• Common examples of adware include pop-up
ads on websites and advertisements that are
displayed by software.
2. Bug:
• In the context of software, a bug is a flaw
produces an undesired outcome.
• These flaws are usually the result of human
error and typically exist in the source code or
compilers of a program.
• Security bugs are the most severe type of bugs
and can allow attackers to bypass user
authentication, override access privileges, or
steal data.
3. Rootkit:
• A Rootkit is a type of malicious software
design to remotely access or control a
computer without being detected by users or
security program.
• Once a rootkit has been installed it is possible
for the malicious party behind the rootkit to
remotely execute files, access/steal
information.
4. Trojan Horse:
• A Trojan horse, commonly known as a
“Trojan,” is a type of malware that disguises
itself as a normal file or program to trick users
into downloading and installing malware.
• A Trojan can give a malicious party remote
access to an infected computer.
5.Ransomware:
• Ransom ware is a form of malware that
essentially holds a computer system captive
while demanding a ransom.
• The malware restricts user access to the
computer either by encrypting files on the
hard drive or locking down the system.
Difference B/W virus and malware
• Virus:
A virus is just one type of malware. But the term virus is
more widely used by the public.
And this is the biggest reason that we know about virus
more than malware.
But malware is a term which refers to any malicious
software, including a computer virus.
How can we protect pc from virus and
malware:
• There are many ways to protect our machines
from virus and malware.
• Download up-to-date security programs,
including antivirus and anti-malware software,
anti-spyware, and a firewall.
• Do not use open Wi-Fi it makes it too easy for
hackers to steal your connection and
download illegal files.
Continue:
• Protect your Wi-Fi with an encrypted
password, and consider refreshing your
equipment every few years.
• Use a strong password that is complex, with a
mix of letters, numbers, and symbols. While
some people use the same password for
everything, try to avoid that practice.
• During password try to use short phrases
separated by spaces or underscore marks
• Such as:
• “Amjad-ALI/55”?
• Just like this…
• Make sure web browser security setting is
high enough to detect unauthorized
downloads.
• You should take proactive measures not to
click on links or attachment that you don’t
trust.
Continue:
• Always use a pop-up blocker for your browser
for experiencing a secure online session.
• A firewall enacts the role of a security guard.
• A firewall is the first step to provide security to
the computer.
• It creates a barrier between the computer and
any unauthorized program trying to come in
through the Internet.

More Related Content

What's hot

Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Computer security
Computer securityComputer security
Computer security
Ayesha Arshad
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 

What's hot (20)

Malware and security
Malware and securityMalware and security
Malware and security
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Malware
MalwareMalware
Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Virus and malware presentation

Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
G Prachi
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
information about virus
information about virusinformation about virus
information about virus
toshan badiye
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
Hassaan Anjum
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentationNeetu Jain
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
diarfirstdiarfirst
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
Anubhav125
 
Malwares
MalwaresMalwares
Malwares
Ishaq Ticklye
 
Computer virus
Computer virusComputer virus
Computer virus
Sarhad Baez
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
T Tanujha
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
Apoorva812677
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 

Similar to Virus and malware presentation (20)

Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Malicious
MaliciousMalicious
Malicious
 
anti_virus
anti_virusanti_virus
anti_virus
 
information about virus
information about virusinformation about virus
information about virus
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer viruses - A daily harm
Computer viruses - A daily harmComputer viruses - A daily harm
Computer viruses - A daily harm
 
Malwares
MalwaresMalwares
Malwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
COMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptxCOMPUTER VIRUS-WPS Office.pptx
COMPUTER VIRUS-WPS Office.pptx
 
Internet security
Internet securityInternet security
Internet security
 
VIRUSES.pptx
VIRUSES.pptxVIRUSES.pptx
VIRUSES.pptx
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Virus and malware presentation

  • 1. Topics: Virus Types of virus Malware Types of Malware Difference B/W virus and malware  How can we protect pc from viruses and malwares.
  • 2. What is Virus? • A computer virus is a program, script or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages or some combination of these action. • A computer virus is much like flu virus, is designed to spread from host to host and has the ability to replicate itself. • Similarly in the same way that viruses cannot produce without a host cell.
  • 3. Continue: • Virus is program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. • When the virus is execute, it spread by copying itself over data files, programs or boot sector of computers hard drive or potentially any thing else writeable.
  • 4. Continue: • To help spread an infection the virus writers use detailed knowledge of security vulnerabilities, zero days or social engineering to gain access to hosts computers..
  • 5.
  • 7. 1. Boot Sector Virus: • From a user perspective, boot sector viruses are some of the most dangerous. • Because they infect the master boot record, they are notoriously difficult to remove, often requiring a full system format. • They typically spread via removable media.
  • 8. 2. Direct Action Virus: • A direct action virus is one of the two main types of file infector viruses. • It works by attaching itself to a particular type of file. • When someone executes the file, it springs into life, looking for other similar files in the directory for it to spread to.
  • 9. 3. Resident Virus: • Resident viruses are the other primary type of file infectors. • they install themselves on a computer. • It allows them to work even when the original source of the infection has been eradicated.
  • 10. 4. Macro Virus: • This is type of file based virus. • It attaches to files made from programs that support macros. • Some examples are Microsoft Excel and Word, and people often unknowingly download them from email attachments. • A good security program scans these types of files before you download them to detect any threats.
  • 11. 5. FAT Virus: • FAT viruses ruin your file allocation system, which is where information about files and where to find them exists. • It even destroys files and the entire directories for them.
  • 12. Malware • Malware is an abbreviated term meaning “malicious software”. • This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. • Malware is a file or code typically delivered over a network, that infects, explores, steals or conduct virtually any behavior an attacker wants.
  • 13. Continue: • Malware usually has one of the following objectives: • Provide remote control for an attacker to use an infected machine. • Send spam from the infected machine to unsuspecting targets. • Steal sensitive data.
  • 15. 1. Adware: • Adware is a type of malware that automatically delivers advertisements. • Common examples of adware include pop-up ads on websites and advertisements that are displayed by software.
  • 16. 2. Bug: • In the context of software, a bug is a flaw produces an undesired outcome. • These flaws are usually the result of human error and typically exist in the source code or compilers of a program. • Security bugs are the most severe type of bugs and can allow attackers to bypass user authentication, override access privileges, or steal data.
  • 17. 3. Rootkit: • A Rootkit is a type of malicious software design to remotely access or control a computer without being detected by users or security program. • Once a rootkit has been installed it is possible for the malicious party behind the rootkit to remotely execute files, access/steal information.
  • 18. 4. Trojan Horse: • A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. • A Trojan can give a malicious party remote access to an infected computer.
  • 19. 5.Ransomware: • Ransom ware is a form of malware that essentially holds a computer system captive while demanding a ransom. • The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system.
  • 20. Difference B/W virus and malware • Virus: A virus is just one type of malware. But the term virus is more widely used by the public. And this is the biggest reason that we know about virus more than malware. But malware is a term which refers to any malicious software, including a computer virus.
  • 21. How can we protect pc from virus and malware: • There are many ways to protect our machines from virus and malware. • Download up-to-date security programs, including antivirus and anti-malware software, anti-spyware, and a firewall. • Do not use open Wi-Fi it makes it too easy for hackers to steal your connection and download illegal files.
  • 22. Continue: • Protect your Wi-Fi with an encrypted password, and consider refreshing your equipment every few years. • Use a strong password that is complex, with a mix of letters, numbers, and symbols. While some people use the same password for everything, try to avoid that practice. • During password try to use short phrases separated by spaces or underscore marks
  • 23. • Such as: • “Amjad-ALI/55”? • Just like this… • Make sure web browser security setting is high enough to detect unauthorized downloads. • You should take proactive measures not to click on links or attachment that you don’t trust.
  • 24. Continue: • Always use a pop-up blocker for your browser for experiencing a secure online session. • A firewall enacts the role of a security guard. • A firewall is the first step to provide security to the computer. • It creates a barrier between the computer and any unauthorized program trying to come in through the Internet.