SlideShare a Scribd company logo
Dr. Mario’s
   VIRUS DETECTION AND
       PREVENTION
DLSPS - Graduate School of Business
           Prepared by:
           LOADING. . .
Table of Contents
•   Introduction
•   Computer Virus Types
•   Detecting Computer Viruses
•   “Catching” a Computer Virus
•   Detecting and Eliminating Computer Viruses
•   References
Introduction
• A computer virus is a computer program that can copy itself and
  infect a computer without permission or knowledge of the user.
  (www.wikipedia.com). The term comes from the term virus in
  biology. Similar to the way a biological virus works, a computer
  virus reproduces by making (possibly modified) copies of itself in
  the computer's memory, storage, or over a network.

                      •   Back to Table of Contents
Computer Type Viruses
• a) Computer System / Boot Record Viruses

   – Attack parts of your computer used to run programs

• b) Computer File Viruses
   – Clings to various programs files`
   – Sample files: .COM, .EXE, .DOC

• c) Common Computer Virus Names
   – Stoned, Love Bug,
   – Check “Data Fellows Computer Virus Information”
   – Check McAfee/Norton/TrendMicro website

                          •   Back to Table of Contents
How Do I Know I Have A Computer
  Virus?
•   Programs take longer to load than normal
•   Hard drive runs out of hard disk space
•   Files have strange names you don’t recognize
•   Conventional memory isles than it used to be
•   Programs run erratically

                 •   Back to Table of Contents
How Can You “Catch” A Computer
  Virus?
•   Flash disks
•   Internet
•   Email
•   Networks

                  •   Back to Table of Contents
How Do I Detect and Eliminate
       Computer Viruses?
• Use anti virus software
  – McAfee
  – Norton
• TrendMicro (online)
• Use firewall
  – Kerio
  – ZoneAlarm

                •   Back to Table of Contents
REFERENCES:  References
•   1. ^ Vesselin Bontchev. Macro Virus Identification Problems. FRISK Software International.
•   2. ^ Malware Evolution: MacOS X Vulnerabilities 2005 - 2006. Kaspersky Lab (July 24, 2006).


                       REFERENCES :
•   3. ^ McAfee. McAfee discovers first Linux virus. news article.
•




         REFERENCES :
    4. ^ Axel Boldt. Bliss, a Linux "virus". news article.


                               •   Back to Table of Contents




                       REFERENCES :
END WITH A BANG

More Related Content

What's hot

Infectious Disease Act 1964
Infectious Disease Act 1964Infectious Disease Act 1964
Infectious Disease Act 1964
BikashDangaura1
 
Techniques & applications of Compiler
Techniques & applications of CompilerTechniques & applications of Compiler
Techniques & applications of Compiler
Preethi AKNR
 
National Health Policy
National Health Policy National Health Policy
National Health Policy
surajtonystark
 
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
Mohammad Aslam Shaiekh
 
Research Review on HRH of Nepal
Research Review on HRH of NepalResearch Review on HRH of Nepal
Research Review on HRH of Nepal
Basanta Chalise
 
Chapter 3 Notes-Environmental Health
Chapter 3 Notes-Environmental HealthChapter 3 Notes-Environmental Health
Chapter 3 Notes-Environmental Health
duncanpatti
 
Health Systems and Health Care Services
Health Systems and Health Care ServicesHealth Systems and Health Care Services
Health Systems and Health Care Services
Prabesh Ghimire
 
Types of software
Types of softwareTypes of software
Types of software
Renée Howard-Johnson
 
Programming Language
Programming LanguageProgramming Language
Programming Language
Madhushree Shettigar
 
Health policy lecture -
Health policy lecture -Health policy lecture -
Health policy lecture -
Lisa Gittner
 
5. sector wide approach (swap)
5. sector wide approach (swap)5. sector wide approach (swap)
5. sector wide approach (swap)
Sanjiv Rajak
 
Health service management(2)
Health service management(2)Health service management(2)
Health service management(2)
Dr. Mohamed Hassan
 

What's hot (12)

Infectious Disease Act 1964
Infectious Disease Act 1964Infectious Disease Act 1964
Infectious Disease Act 1964
 
Techniques & applications of Compiler
Techniques & applications of CompilerTechniques & applications of Compiler
Techniques & applications of Compiler
 
National Health Policy
National Health Policy National Health Policy
National Health Policy
 
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
Swot analysis of Safe motherhood, HIV & AIDS, ARI and Logistic Management Pro...
 
Research Review on HRH of Nepal
Research Review on HRH of NepalResearch Review on HRH of Nepal
Research Review on HRH of Nepal
 
Chapter 3 Notes-Environmental Health
Chapter 3 Notes-Environmental HealthChapter 3 Notes-Environmental Health
Chapter 3 Notes-Environmental Health
 
Health Systems and Health Care Services
Health Systems and Health Care ServicesHealth Systems and Health Care Services
Health Systems and Health Care Services
 
Types of software
Types of softwareTypes of software
Types of software
 
Programming Language
Programming LanguageProgramming Language
Programming Language
 
Health policy lecture -
Health policy lecture -Health policy lecture -
Health policy lecture -
 
5. sector wide approach (swap)
5. sector wide approach (swap)5. sector wide approach (swap)
5. sector wide approach (swap)
 
Health service management(2)
Health service management(2)Health service management(2)
Health service management(2)
 

Similar to Virus detection and prevention

Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
vivek pratap singh
 
Isas
IsasIsas
Viruses worms
Viruses wormsViruses worms
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1
Lastline, Inc.
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
GrittyCC
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
wargames12
 
Virus
VirusVirus
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
Utkarsh Srivastava
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Pankaj Kumawat
 
anti_virus
anti_virusanti_virus
anti_virus
sharq university
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
shashank kurakula
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alishba ijaz Muhammad Ijaz
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Babita Pant
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
mkgspsu
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
Adeel Rasheed
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
SreelekshmiAS11
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
tayyaba rashid
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
AnaniaDaxo
 
Computer Malware Into
Computer Malware IntoComputer Malware Into
Computer Malware Into
Afeef Khateeb
 
Thur Venture
Thur VentureThur Venture

Similar to Virus detection and prevention (20)

Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
Isas
IsasIsas
Isas
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Virus
VirusVirus
Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Cause and effects of computer virus
Cause and effects of computer virus Cause and effects of computer virus
Cause and effects of computer virus
 
COMPUTER VIRUS
COMPUTER VIRUS COMPUTER VIRUS
COMPUTER VIRUS
 
Computer Malware Into
Computer Malware IntoComputer Malware Into
Computer Malware Into
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 

Recently uploaded

Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

Virus detection and prevention

  • 1. Dr. Mario’s VIRUS DETECTION AND PREVENTION DLSPS - Graduate School of Business Prepared by: LOADING. . .
  • 2. Table of Contents • Introduction • Computer Virus Types • Detecting Computer Viruses • “Catching” a Computer Virus • Detecting and Eliminating Computer Viruses • References
  • 3. Introduction • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. (www.wikipedia.com). The term comes from the term virus in biology. Similar to the way a biological virus works, a computer virus reproduces by making (possibly modified) copies of itself in the computer's memory, storage, or over a network. • Back to Table of Contents
  • 4. Computer Type Viruses • a) Computer System / Boot Record Viruses – Attack parts of your computer used to run programs • b) Computer File Viruses – Clings to various programs files` – Sample files: .COM, .EXE, .DOC • c) Common Computer Virus Names – Stoned, Love Bug, – Check “Data Fellows Computer Virus Information” – Check McAfee/Norton/TrendMicro website • Back to Table of Contents
  • 5. How Do I Know I Have A Computer Virus? • Programs take longer to load than normal • Hard drive runs out of hard disk space • Files have strange names you don’t recognize • Conventional memory isles than it used to be • Programs run erratically • Back to Table of Contents
  • 6. How Can You “Catch” A Computer Virus? • Flash disks • Internet • Email • Networks • Back to Table of Contents
  • 7. How Do I Detect and Eliminate Computer Viruses? • Use anti virus software – McAfee – Norton • TrendMicro (online) • Use firewall – Kerio – ZoneAlarm • Back to Table of Contents
  • 8. REFERENCES: References • 1. ^ Vesselin Bontchev. Macro Virus Identification Problems. FRISK Software International. • 2. ^ Malware Evolution: MacOS X Vulnerabilities 2005 - 2006. Kaspersky Lab (July 24, 2006). REFERENCES : • 3. ^ McAfee. McAfee discovers first Linux virus. news article. • REFERENCES : 4. ^ Axel Boldt. Bliss, a Linux "virus". news article. • Back to Table of Contents REFERENCES :
  • 9. END WITH A BANG