SlideShare a Scribd company logo
1 of 19
STUDENT’S SEMINAR
INTRODUCTION
DEFINITION:
A computer virus is a program or code that attaches itself to a
legitimate, executable piece of software, and then reproduces
itself when that program is run.
•In 1949, John von Neumann gave "self altering automata theory" which
is the result of mathematical research .
•In 1960, experts in BELL lab created a program that can reproduce itself
and can destroy the artificial opponent. Programs that are able to survive
and destroy all other programs, will be considered the winner. This game
ended up being a favourite game in each computer lab.
•In 1980, programs that eventually known as "virus" was successfully
spread beyond the laboratory environment, and began circulating in the
general population.
WHAT IS THE NEED?
Malware is not used just to annoy users, but to steal their
passwords, banking and credit card details, entangle
them in scams and fraud, etc., all things that can have
serious financial consequences.
“Kaspersky Labs” made a study and found that:
There were 5,903,377 registered notifications about
attempted malware infections aiming at stealing money
via online access to bank accounts.
How does the Virus spread?
Virus can infect your computer via emails and files
downloaded from the Internet or copied from USB drives or
other computers. Hackers can also take advantage of
software vulnerabilities to remotely install virus on your
computer without your awareness.
How to recognize the presence of virus?
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard-disk runs out of space.
• The computer does not boot.
• Antivirus and firewall are disabled automatically.
• Unusual messages on screen!
• This type of virus infects the Master Boot
Record (MBR) of a hard drive, or the Floppy
Boot Record (FBR) of a floppy drive and virus
runs each time the system boots.
Boot Viruses
• A polymorphic virus creates an infection in a
computer that is known as a polymorphic
infection that creates copies of itself, with
each copy different to fool a virus detection
and users.
Polymorphic
Viruses
• A MAC or Macro virus is a computer virus
that spreads to other computers
through software programs that utilize
macros. For example, Microsoft
Word and Microsoft Excel.
Macro Viruses
BOOT VIRUS
A boot virus (also known as a boot infector or an MBR) targets and infects a
specific, physical section of a computer system that contains information
crucial to the proper operation of the computer's operating system (OS).
Boot viruses may differ based on whether they target the MBR or the FBR.
Infection Overview:
Step -1: Write original boot sector elsewhere on the disk.
Step-2:Write virus to the boot sector.
POLYMORPHIC VIRUS
• A polymorphic virus might have a virus decryption routine (VDR) and an
encrypted virus program body (EVB). When an infected application
launches, the VDR decrypts the encrypted virus body EVB back to its
original form so the virus can perform its intended function.
• Polymorphic viruses change their code each time as they duplicate
themselves.
• In this way each new copy is a variation of older copy!
MACRO VIRUS
• In computing terminology, a macro virus is a virus that is
written in a macro language : that is to say, a programming
language which is embedded inside a software application.
• Macros are sets of instructions that can be triggered by a
single command.
• Macro viruses are most commonly associated with Microsoft
Office programs (such as Word, Excel or Access) as these are
the most promptly used documents.
• The Melissa (created by David L. Smith) virus from March 1999 is a good
example of how viruses inflict damage. Melissa lurked inside an e-mail
Microsoft Word attachment. The e-mail's subject line appeared to be from
someone the recipient recognized.
• However, once the recipient clicked on the attachment, Melissa fused itself
to a Word object and began rifling through the victim's address book.
MISCONCEPTION
Worms, Viruses, Trojans are all part of a class of software called
malware , but they are not the same thing.
WORMS
• Stand Alone and
do not need a
software to hide
in.
• Use computer
networks to send
malicious
software to
other
computers,
spreading from
computer to
computer.
VIRUS
• A computer virus
inserts a copy of
itself into and
becoming part of
another program.
• They replicate
themselves, and
most come
attached to an
executable file,
which means a
person has to
actually run the
program for the
virus to become
active and spread.
TROJANS
• It is a harmful
piece of software
that looks
legitimate
• People are
tricked into using
such software.
• Trojan Horses do
not replicate
themselves the
way viruses and
worms do.
ANTI-VIRUS
• An antivirus software is a computer program that
identify and remove computer viruses, and other
malicious software like Worms and Trojans from
an infected computer. Not only this, an antivirus
software also protects the computer from further
virus attacks.
• There are two basic approaches used by Antivirus:
1. Dictionary Approach
2. Suspicious Behavior Approach
USING DICTIONARY APPROACH:
• The antivirus software examines each and every file in a
computer and examines its content with the virus definitions
stored in its virus dictionary.
• A virus dictionary is an inbuilt file belonging to an antivirus
software that contains code identified as a virus by the
antivirus authors.
Using Suspicious Behavior Approach:
•Antivirus software constantly monitors the activity of all
the programs.
•If any program tries to write data on an executable file, the
antivirus software will flag the program having a suspicious
behavior, means the suspected program will be marked as
a virus.
•The advantage of this approach is that it can safeguard
the computer against unknown viruses also.
•The disadvantage is that it may create several false alerts
too.
Source: www.techspot.com
What one can do to be safe?
• Turn on your firewall.
• Use Windows Defender.
• Install and utilize anti-virus software, and be sure to update it as
necessary.
• Utilize an anti-malware program.
• Don’t click on anything you aren’t sure about. If something seems
suspicious, chances are it is.
• Back up your computer, and do it often! Protect yourself in case the
worst happens.
Virus-Awareness

More Related Content

What's hot (20)

virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Malware
MalwareMalware
Malware
 
Ppt123
Ppt123Ppt123
Ppt123
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
What is a computer virus
What is a computer virusWhat is a computer virus
What is a computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
What is malware
What is malwareWhat is malware
What is malware
 
computer Virus
computer Virus computer Virus
computer Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Antivirus
AntivirusAntivirus
Antivirus
 
Viruses and its type..
Viruses and its type..Viruses and its type..
Viruses and its type..
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Viewers also liked

MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservicesMediaMosa
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet securityhimeag
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminarSai Ram
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technologyguest5fd01d
 
Computer viruses
Computer virusesComputer viruses
Computer virusesAnnies Minu
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014Shwana M
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (13)

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Computer security 101
Computer security 101Computer security 101
Computer security 101
 
MediaMosa and webservices
MediaMosa and webservicesMediaMosa and webservices
MediaMosa and webservices
 
Viruses and internet security
Viruses and internet securityViruses and internet security
Viruses and internet security
 
Consumer electronics seminar
Consumer electronics seminarConsumer electronics seminar
Consumer electronics seminar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus 2014 more design 2014
virus 2014 more design 2014virus 2014 more design 2014
virus 2014 more design 2014
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Virus-Awareness

Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxDEEP TIWARI
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxDEEP TIWARI
 

Similar to Virus-Awareness (20)

Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptxvcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Madhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptxMadhu Devi ppt(computer virus and its management).pptx
Madhu Devi ppt(computer virus and its management).pptx
 
Virus
VirusVirus
Virus
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Virus-Awareness

  • 2. INTRODUCTION DEFINITION: A computer virus is a program or code that attaches itself to a legitimate, executable piece of software, and then reproduces itself when that program is run. •In 1949, John von Neumann gave "self altering automata theory" which is the result of mathematical research . •In 1960, experts in BELL lab created a program that can reproduce itself and can destroy the artificial opponent. Programs that are able to survive and destroy all other programs, will be considered the winner. This game ended up being a favourite game in each computer lab. •In 1980, programs that eventually known as "virus" was successfully spread beyond the laboratory environment, and began circulating in the general population.
  • 3. WHAT IS THE NEED? Malware is not used just to annoy users, but to steal their passwords, banking and credit card details, entangle them in scams and fraud, etc., all things that can have serious financial consequences. “Kaspersky Labs” made a study and found that: There were 5,903,377 registered notifications about attempted malware infections aiming at stealing money via online access to bank accounts.
  • 4. How does the Virus spread? Virus can infect your computer via emails and files downloaded from the Internet or copied from USB drives or other computers. Hackers can also take advantage of software vulnerabilities to remotely install virus on your computer without your awareness.
  • 5. How to recognize the presence of virus? • The computer system becomes slow. • The size of available free memory reduces. • The hard-disk runs out of space. • The computer does not boot. • Antivirus and firewall are disabled automatically. • Unusual messages on screen!
  • 6. • This type of virus infects the Master Boot Record (MBR) of a hard drive, or the Floppy Boot Record (FBR) of a floppy drive and virus runs each time the system boots. Boot Viruses • A polymorphic virus creates an infection in a computer that is known as a polymorphic infection that creates copies of itself, with each copy different to fool a virus detection and users. Polymorphic Viruses • A MAC or Macro virus is a computer virus that spreads to other computers through software programs that utilize macros. For example, Microsoft Word and Microsoft Excel. Macro Viruses
  • 7. BOOT VIRUS A boot virus (also known as a boot infector or an MBR) targets and infects a specific, physical section of a computer system that contains information crucial to the proper operation of the computer's operating system (OS). Boot viruses may differ based on whether they target the MBR or the FBR. Infection Overview: Step -1: Write original boot sector elsewhere on the disk. Step-2:Write virus to the boot sector.
  • 8. POLYMORPHIC VIRUS • A polymorphic virus might have a virus decryption routine (VDR) and an encrypted virus program body (EVB). When an infected application launches, the VDR decrypts the encrypted virus body EVB back to its original form so the virus can perform its intended function. • Polymorphic viruses change their code each time as they duplicate themselves. • In this way each new copy is a variation of older copy!
  • 9. MACRO VIRUS • In computing terminology, a macro virus is a virus that is written in a macro language : that is to say, a programming language which is embedded inside a software application. • Macros are sets of instructions that can be triggered by a single command. • Macro viruses are most commonly associated with Microsoft Office programs (such as Word, Excel or Access) as these are the most promptly used documents.
  • 10. • The Melissa (created by David L. Smith) virus from March 1999 is a good example of how viruses inflict damage. Melissa lurked inside an e-mail Microsoft Word attachment. The e-mail's subject line appeared to be from someone the recipient recognized. • However, once the recipient clicked on the attachment, Melissa fused itself to a Word object and began rifling through the victim's address book.
  • 11. MISCONCEPTION Worms, Viruses, Trojans are all part of a class of software called malware , but they are not the same thing.
  • 12. WORMS • Stand Alone and do not need a software to hide in. • Use computer networks to send malicious software to other computers, spreading from computer to computer. VIRUS • A computer virus inserts a copy of itself into and becoming part of another program. • They replicate themselves, and most come attached to an executable file, which means a person has to actually run the program for the virus to become active and spread. TROJANS • It is a harmful piece of software that looks legitimate • People are tricked into using such software. • Trojan Horses do not replicate themselves the way viruses and worms do.
  • 13. ANTI-VIRUS • An antivirus software is a computer program that identify and remove computer viruses, and other malicious software like Worms and Trojans from an infected computer. Not only this, an antivirus software also protects the computer from further virus attacks. • There are two basic approaches used by Antivirus: 1. Dictionary Approach 2. Suspicious Behavior Approach
  • 14. USING DICTIONARY APPROACH: • The antivirus software examines each and every file in a computer and examines its content with the virus definitions stored in its virus dictionary. • A virus dictionary is an inbuilt file belonging to an antivirus software that contains code identified as a virus by the antivirus authors.
  • 15. Using Suspicious Behavior Approach: •Antivirus software constantly monitors the activity of all the programs. •If any program tries to write data on an executable file, the antivirus software will flag the program having a suspicious behavior, means the suspected program will be marked as a virus. •The advantage of this approach is that it can safeguard the computer against unknown viruses also. •The disadvantage is that it may create several false alerts too.
  • 17.
  • 18. What one can do to be safe? • Turn on your firewall. • Use Windows Defender. • Install and utilize anti-virus software, and be sure to update it as necessary. • Utilize an anti-malware program. • Don’t click on anything you aren’t sure about. If something seems suspicious, chances are it is. • Back up your computer, and do it often! Protect yourself in case the worst happens.

Editor's Notes

  1. The word virus is often being used as a common term for all malicious programs, but technically
  2. USB drive is the second common way to distribute virus. When you insert your USB drive to a computer you may have no idea that there are several viruses hiding in the computer to enter that USB memory stick which then become a vehicle for the virus to take shelter in your own computer.
  3. http://userpages.umbc.edu/~dgorin1/432/viruses.htm The MBR is the first sector of a hard drive and is usually located on track 0. It contains the initial loader and information about partition tables on a hard disk. The DBR is usually located a few sectors (62 sectors after on a hard disk with 63 sectors per track) after the MBR, and contains the initial loader for an operating system and logical drive information. The FBR is use for the same purposes as DBR on a hard drive, but it is located on the first track of a diskette. Though boot viruses were once more common in the early 90s, they have since become less of a threat, as most computer motherboards now provide protection against such threats by denying access to the MBR without user permission. In recent years however, more sophisticated malware has been developed that have begin retargeting the MBR 
  4. https://www.youtube.com/watch?v=y8a3QoTg4VQ
  5. www.techspot.com