SlideShare a Scribd company logo
1 of 12
Presented by:
Kartik N. Kalpande..!
Agenda
๏‚— Introduction
๏‚— Types of Viruses
๏‚— Phases of Virus
๏‚— Difference between Virus & Worms
๏‚— Advantages
๏‚— Disadvantages
๏‚— Conclusion
Introduction
๏‚— Virus:-
A virus is a code or program that attaches itself to
another code or program which causes damage to the computer
system or to the network
It can replicate them. all computer viruses are manmade.
Any simple viruses can make a copy of itself over and over again.
Any simple viruses can be dangerous because it will
quickly use all available memory space and bring the system to a
halt.
Whereas, dangerous viruses are capable of transmitting
itself across networks and can be able to avoid security system.
Worms
๏‚— A worm is a special type of virus that can replicate itself
and use memory but can not attach itself to other
program
๏‚— Virus and worms will be the most common problem
that an organization faces
๏‚— Highly organized criminal groups want use the
technology used in worm propagation and virus, but
their use are normally interested in accomplishing is
limited.
Type of Viruses
๏‚— Parasitic viruses:-
It attaches itself to executable code and replicates itself. When the
infected code is executed it will find other executable code or program to
infect.
๏‚— Memory resident virus:-
This type of virus lives in memory after its execution. It inserts themselves
as a part of operating system or application and can manipulate any file
that is executed, copied or moved.
๏‚— Non-resident virus:-
This type of virus executes itself and terminated or destroyed after
specific time .
๏‚— Overwriting virus:-
This types of virus overwrite the code with its own code.
๏‚— Boot sector virus:-
This type of virus infects the boot record and spread through a
system when a system is booted from disk containing virus.
๏‚— Stealth virus:- it is the virus who hide the modification it has
made in the file or boot record.
๏‚— Macro virus:-
This viruses are not executable.It affects microsoft word like
documents they can spread through email.
๏‚— Companion virus:-
This is the virus which create a new program instead of modifying
an existing file
๏‚— Email viruses:-
Virus get executed when email attachment is open by
recipient. virus send itself to everyone on the mailing
list of sender.
๏‚— Polymorphic virus:-
It produces fully operational copies of itself,in an
attempts to avoid signature detection.
Phases of viruses(Life cycle of
Virus)
๏‚— Dormant phase:-
This virus is idle and eventually activated by some events.
๏‚— Propagation phase:-
The virus places and identical copy of itself into other
programs or into certain system areas on the disk
๏‚— Triggering phase:-
The virus is activated to perform the function for which it
was intended.
๏‚— Execution phase:-
In this phase the virus performs its actual operation.
Disadvantages
๏‚— It delete files in system.
๏‚— When a computer system is infected due to virus then it is
difficult to recover.
๏‚— Virus causes malfunctioning of a computer system
๏‚— It automatically attach to the executable file and replicate itself.
๏‚— It occupies disk space.
Difference between Virus and Worm
๏‚— Virus does not replicate itself whereas worm replicate
itself
๏‚— Virus is destructive in nature whereas worm is non
destructive
๏‚— Virus can infect other file whereas worm does not
infect other file but it occupies memory space by
replication
๏‚— Aim of virus is to infect the code or program stored on
computer system whereas the aim worm is to mac
computer and network unusable.
Conclusion
๏‚— It is harmful to our system so we should always use
antivirus software to protect our system
๏‚— We can use Linux operating system to avoid viruses and
worms because Linux does not support viruses
Thank You!!!

More Related Content

What's hot

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
ย 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networksG Prachi
ย 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
ย 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.pptIbrahimAl22
ย 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemMohit Belwal
ย 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
ย 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
ย 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
ย 
Software security
Software securitySoftware security
Software securityRoman Oliynykov
ย 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
ย 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
ย 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Securitylalithambiga kamaraj
ย 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
ย 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
ย 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and VirusesAmrit Kaur
ย 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
ย 

What's hot (20)

Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
ย 
LAN Security
LAN Security LAN Security
LAN Security
ย 
Database security and security in networks
Database security and security in networksDatabase security and security in networks
Database security and security in networks
ย 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
ย 
ch02_2.ppt
ch02_2.pptch02_2.ppt
ch02_2.ppt
ย 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
ย 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
ย 
Trojan horse
Trojan horseTrojan horse
Trojan horse
ย 
Spoofing
SpoofingSpoofing
Spoofing
ย 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
ย 
Software security
Software securitySoftware security
Software security
ย 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
ย 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ย 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
ย 
Antivirus
AntivirusAntivirus
Antivirus
ย 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
ย 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
ย 
Security and Viruses
Security and VirusesSecurity and Viruses
Security and Viruses
ย 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
ย 
Network security
Network securityNetwork security
Network security
ย 

Similar to Viruses ppt

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
ย 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarnnimmi_abes
ย 
Virus
VirusVirus
Virusdddaou
ย 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18Muhammad Ramzan
ย 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
ย 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and DefenseMd.Tanvir Ul Haque
ย 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
ย 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
ย 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virusDivyesh Rakholiya
ย 
Virus and worms
Virus and wormsVirus and worms
Virus and wormsVikas Sharma
ย 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsSelim Reza Bappy
ย 
Virus
VirusVirus
VirusProtik Roy
ย 

Similar to Viruses ppt (20)

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
ย 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
ย 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
ย 
Computer viruses
Computer virusesComputer viruses
Computer viruses
ย 
Virus
VirusVirus
Virus
ย 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
ย 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
ย 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
ย 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
ย 
Viruses notes
Viruses notesViruses notes
Viruses notes
ย 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
ย 
Malicious software
Malicious softwareMalicious software
Malicious software
ย 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
ย 
Virus
VirusVirus
Virus
ย 
Computer virus
Computer virusComputer virus
Computer virus
ย 
Ch19
Ch19Ch19
Ch19
ย 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
ย 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
ย 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
ย 
Virus
VirusVirus
Virus
ย 

More from Kartik Kalpande Patil

Data mining and knowledge Discovery
Data mining and knowledge DiscoveryData mining and knowledge Discovery
Data mining and knowledge DiscoveryKartik Kalpande Patil
ย 
wireless charging in phones
wireless charging in phoneswireless charging in phones
wireless charging in phonesKartik Kalpande Patil
ย 
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Kartik Kalpande Patil
ย 
Resent intel microprocessor
Resent intel microprocessorResent intel microprocessor
Resent intel microprocessorKartik Kalpande Patil
ย 
Network simulation software
Network simulation softwareNetwork simulation software
Network simulation softwareKartik Kalpande Patil
ย 
Microprocessor in human body
Microprocessor in human bodyMicroprocessor in human body
Microprocessor in human bodyKartik Kalpande Patil
ย 
Microcontroller in automobile and applications
Microcontroller in automobile and applicationsMicrocontroller in automobile and applications
Microcontroller in automobile and applicationsKartik Kalpande Patil
ย 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printerKartik Kalpande Patil
ย 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gatewayKartik Kalpande Patil
ย 

More from Kartik Kalpande Patil (20)

Data mining and knowledge Discovery
Data mining and knowledge DiscoveryData mining and knowledge Discovery
Data mining and knowledge Discovery
ย 
wireless charging in phones
wireless charging in phoneswireless charging in phones
wireless charging in phones
ย 
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
Wirelessmobilechargingusingmicrowavesjazz 140128114925-phpapp02
ย 
Versions of android
Versions of androidVersions of android
Versions of android
ย 
Ruby programming
Ruby programmingRuby programming
Ruby programming
ย 
Resent intel motherboards
Resent intel motherboardsResent intel motherboards
Resent intel motherboards
ย 
Resent intel microprocessor
Resent intel microprocessorResent intel microprocessor
Resent intel microprocessor
ย 
Parallel computing
Parallel computingParallel computing
Parallel computing
ย 
Open source movement
Open source movementOpen source movement
Open source movement
ย 
Object oriented dbms
Object oriented dbmsObject oriented dbms
Object oriented dbms
ย 
Network simulation software
Network simulation softwareNetwork simulation software
Network simulation software
ย 
Mirroring and replications
Mirroring and replicationsMirroring and replications
Mirroring and replications
ย 
Microprocessor in human body
Microprocessor in human bodyMicroprocessor in human body
Microprocessor in human body
ย 
Microcontroller in automobile and applications
Microcontroller in automobile and applicationsMicrocontroller in automobile and applications
Microcontroller in automobile and applications
ย 
Mahol. android ppt
Mahol. android pptMahol. android ppt
Mahol. android ppt
ย 
applet using java
applet using javaapplet using java
applet using java
ย 
Hadoop
HadoopHadoop
Hadoop
ย 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printer
ย 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
ย 
Data mining semiinar ppo
Data mining semiinar  ppoData mining semiinar  ppo
Data mining semiinar ppo
ย 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
ย 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
ย 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
ย 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
ย 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
ย 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
ย 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
ย 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 

Viruses ppt

  • 2. Agenda ๏‚— Introduction ๏‚— Types of Viruses ๏‚— Phases of Virus ๏‚— Difference between Virus & Worms ๏‚— Advantages ๏‚— Disadvantages ๏‚— Conclusion
  • 3. Introduction ๏‚— Virus:- A virus is a code or program that attaches itself to another code or program which causes damage to the computer system or to the network It can replicate them. all computer viruses are manmade. Any simple viruses can make a copy of itself over and over again. Any simple viruses can be dangerous because it will quickly use all available memory space and bring the system to a halt. Whereas, dangerous viruses are capable of transmitting itself across networks and can be able to avoid security system.
  • 4. Worms ๏‚— A worm is a special type of virus that can replicate itself and use memory but can not attach itself to other program ๏‚— Virus and worms will be the most common problem that an organization faces ๏‚— Highly organized criminal groups want use the technology used in worm propagation and virus, but their use are normally interested in accomplishing is limited.
  • 5. Type of Viruses ๏‚— Parasitic viruses:- It attaches itself to executable code and replicates itself. When the infected code is executed it will find other executable code or program to infect. ๏‚— Memory resident virus:- This type of virus lives in memory after its execution. It inserts themselves as a part of operating system or application and can manipulate any file that is executed, copied or moved. ๏‚— Non-resident virus:- This type of virus executes itself and terminated or destroyed after specific time . ๏‚— Overwriting virus:- This types of virus overwrite the code with its own code.
  • 6. ๏‚— Boot sector virus:- This type of virus infects the boot record and spread through a system when a system is booted from disk containing virus. ๏‚— Stealth virus:- it is the virus who hide the modification it has made in the file or boot record. ๏‚— Macro virus:- This viruses are not executable.It affects microsoft word like documents they can spread through email. ๏‚— Companion virus:- This is the virus which create a new program instead of modifying an existing file
  • 7. ๏‚— Email viruses:- Virus get executed when email attachment is open by recipient. virus send itself to everyone on the mailing list of sender. ๏‚— Polymorphic virus:- It produces fully operational copies of itself,in an attempts to avoid signature detection.
  • 8. Phases of viruses(Life cycle of Virus) ๏‚— Dormant phase:- This virus is idle and eventually activated by some events. ๏‚— Propagation phase:- The virus places and identical copy of itself into other programs or into certain system areas on the disk ๏‚— Triggering phase:- The virus is activated to perform the function for which it was intended. ๏‚— Execution phase:- In this phase the virus performs its actual operation.
  • 9. Disadvantages ๏‚— It delete files in system. ๏‚— When a computer system is infected due to virus then it is difficult to recover. ๏‚— Virus causes malfunctioning of a computer system ๏‚— It automatically attach to the executable file and replicate itself. ๏‚— It occupies disk space.
  • 10. Difference between Virus and Worm ๏‚— Virus does not replicate itself whereas worm replicate itself ๏‚— Virus is destructive in nature whereas worm is non destructive ๏‚— Virus can infect other file whereas worm does not infect other file but it occupies memory space by replication ๏‚— Aim of virus is to infect the code or program stored on computer system whereas the aim worm is to mac computer and network unusable.
  • 11. Conclusion ๏‚— It is harmful to our system so we should always use antivirus software to protect our system ๏‚— We can use Linux operating system to avoid viruses and worms because Linux does not support viruses