SlideShare a Scribd company logo
1 of 28
A Presentation of Network System
VIRUS and FIREWALLS
Submitted To: Submitted By:
Miss Malti Vikash MainanwaI
Department of Computer Science & Engineering
Punjab Institute of Technology, Kapurthala
(PTU Main Campus)
*CONTENTS*
•Virus
•Virus Types
•Action To prevent virus
•Firewalls
•Types of firewalls
Computer Virus
What is computer virus?
Computer virus refers to a
program which damages computer
systems and/or destroys or erases
data files
Types of Computer Virus
Time Bomb
Logical Bomb
Worm
Boot Sector Virus
Macros Virus
Trojan Horse
Script Virus
Time Bomb
A time bomb is a virus program
that performs an activity on a
particular date
Logical Bomb
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
Worm Virus
A worm is also a destructive
program that fills a computer
system with self-replicating
information, clogging the system so
that its operations are slowed down
or stopped
Boot Sector Virus
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
Macro Virus
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded
into main memory and destroys the
data stored in hard disk
Script Virus
Commonly found script viruses are
written using the Visual Basic
Scripting edition (VBS) and the
JavaScript programming languages
Trojan Horse
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
Trojan Horse
Trojan Horse usually comes with
monitoring tools and key loggers
Actions to prevent virus infection
Always update your anti-virus
software at least weekly.
Back up your important files and
ensure that they can be restored.
Change the computer's boot
sequence to always start the PC
from its hard drive
Actions to prevent virus infection
Don't share Drive C: without a
password and without read-only
restrictions.
Empty floppy drives of diskettes
before turning on computers,
especially laptops.
Actions to prevent virus infection
Forget opening unexpected e-mail
attachments, even if they're from
friends
Get trained on your computer's
anti-virus software and use it.
Have multiple backups of important
files. This lowers the chance that all
are infected.
Actions to prevent virus infection
Install security updates for your
operating system and programs as
soon as possible.
Jump at the chance to learn more
about your computer. This will help
you spot viruses.
Firewalls
• Firewall is used to protect the network from
unauthorized access.
• A firewall is a junction of gateway between
the two network
Types of Firewalls
• Packet Filtering firewalls
• Application Gateway
• Circuit level Gateway
Packet filtering firewalls
• A Packet Filter Firewall apply set of rules
to each packet based on traffic it decide
either forward packet or discard
• Also called screening router firewall
• The rules are based on TCP/IP Header
• Source/Destination IP Address
• Source/Destination port number
Advantage of Packet Firewalls
• Low cost and low impact on network performance
• Mostly router support packet filtering feature
• This type of firewall works at network layer
Application level Gateway
• Is also called proxy server
• It acts like a proxy and decide about flow of
communication
Circuit level Gateway
• It works on Session layer and TCP layer
• This is useful for hiding the information
about the protecting network
• A circuit gateway creates a new connection
between itself and remote system
Circuit……
Any Query
Virus Attack & firewall by vikash mainanwal

More Related Content

What's hot

Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand securityarun nalam
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7Don Kim
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Rahman_Hussain
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spreadwenxin
 
As computer virus
As computer virusAs computer virus
As computer virusachal bisht
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 

What's hot (20)

Anti virus
Anti virusAnti virus
Anti virus
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer virus
Computer virusComputer virus
Computer virus
 
Application'sand security
Application'sand securityApplication'sand security
Application'sand security
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7Design and Analyze Secure Networked Systems - 7
Design and Analyze Secure Networked Systems - 7
 
Virus part2
Virus part2Virus part2
Virus part2
 
Securing The Computer From Viruses ...
Securing The Computer From Viruses ...Securing The Computer From Viruses ...
Securing The Computer From Viruses ...
 
information about virus
information about virusinformation about virus
information about virus
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus
VirusVirus
Virus
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
As computer virus
As computer virusAs computer virus
As computer virus
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
anti_virus
anti_virusanti_virus
anti_virus
 

Similar to Virus Attack & firewall by vikash mainanwal

Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptxReshmaBV2
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Network security
Network securityNetwork security
Network securityPreethi B
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure shubhamverma2711
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 

Similar to Virus Attack & firewall by vikash mainanwal (20)

Firewall
FirewallFirewall
Firewall
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ascomputervirus
AscomputervirusAscomputervirus
Ascomputervirus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Network security
Network securityNetwork security
Network security
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Mitppt
MitpptMitppt
Mitppt
 
Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
ANTIVIRUS.pptx
ANTIVIRUS.pptxANTIVIRUS.pptx
ANTIVIRUS.pptx
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computing safety
Computing safetyComputing safety
Computing safety
 

More from VIKASH MAINANWAL

Gas Management System by Vikash Mainanwal
Gas Management System by Vikash MainanwalGas Management System by Vikash Mainanwal
Gas Management System by Vikash MainanwalVIKASH MAINANWAL
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalVIKASH MAINANWAL
 
Asynchronous Message Passing
Asynchronous Message PassingAsynchronous Message Passing
Asynchronous Message PassingVIKASH MAINANWAL
 
Implicit and explicit sequence control with exception handling
Implicit and explicit sequence control with exception handlingImplicit and explicit sequence control with exception handling
Implicit and explicit sequence control with exception handlingVIKASH MAINANWAL
 

More from VIKASH MAINANWAL (6)

Remote Procedure Call
Remote Procedure CallRemote Procedure Call
Remote Procedure Call
 
Gas Management System by Vikash Mainanwal
Gas Management System by Vikash MainanwalGas Management System by Vikash Mainanwal
Gas Management System by Vikash Mainanwal
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash Maianwal
 
Asynchronous Message Passing
Asynchronous Message PassingAsynchronous Message Passing
Asynchronous Message Passing
 
Implicit and explicit sequence control with exception handling
Implicit and explicit sequence control with exception handlingImplicit and explicit sequence control with exception handling
Implicit and explicit sequence control with exception handling
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Virus Attack & firewall by vikash mainanwal

  • 1. A Presentation of Network System VIRUS and FIREWALLS Submitted To: Submitted By: Miss Malti Vikash MainanwaI Department of Computer Science & Engineering Punjab Institute of Technology, Kapurthala (PTU Main Campus)
  • 2. *CONTENTS* •Virus •Virus Types •Action To prevent virus •Firewalls •Types of firewalls
  • 3.
  • 5. What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files
  • 6. Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Trojan Horse Script Virus
  • 7. Time Bomb A time bomb is a virus program that performs an activity on a particular date
  • 8. Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 9. Worm Virus A worm is also a destructive program that fills a computer system with self-replicating information, clogging the system so that its operations are slowed down or stopped
  • 10. Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 11. Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
  • 12. Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
  • 13. Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 14. Trojan Horse Trojan Horse usually comes with monitoring tools and key loggers
  • 15. Actions to prevent virus infection Always update your anti-virus software at least weekly. Back up your important files and ensure that they can be restored. Change the computer's boot sequence to always start the PC from its hard drive
  • 16. Actions to prevent virus infection Don't share Drive C: without a password and without read-only restrictions. Empty floppy drives of diskettes before turning on computers, especially laptops.
  • 17. Actions to prevent virus infection Forget opening unexpected e-mail attachments, even if they're from friends Get trained on your computer's anti-virus software and use it. Have multiple backups of important files. This lowers the chance that all are infected.
  • 18. Actions to prevent virus infection Install security updates for your operating system and programs as soon as possible. Jump at the chance to learn more about your computer. This will help you spot viruses.
  • 19. Firewalls • Firewall is used to protect the network from unauthorized access. • A firewall is a junction of gateway between the two network
  • 20. Types of Firewalls • Packet Filtering firewalls • Application Gateway • Circuit level Gateway
  • 21. Packet filtering firewalls • A Packet Filter Firewall apply set of rules to each packet based on traffic it decide either forward packet or discard • Also called screening router firewall • The rules are based on TCP/IP Header • Source/Destination IP Address • Source/Destination port number
  • 22.
  • 23. Advantage of Packet Firewalls • Low cost and low impact on network performance • Mostly router support packet filtering feature • This type of firewall works at network layer
  • 24. Application level Gateway • Is also called proxy server • It acts like a proxy and decide about flow of communication
  • 25. Circuit level Gateway • It works on Session layer and TCP layer • This is useful for hiding the information about the protecting network • A circuit gateway creates a new connection between itself and remote system