SlideShare a Scribd company logo
1 of 6
VIRUSES
• A virus is a piece of code that inserts itself into an application and executes
when the app is run. Once inside a network, a virus may be used to steal
sensitive data, launch DDoS attacks or conduct ransomware attacks.
• A virus cannot execute or reproduce unless the app it has infected is running.
This dependence on a host application makes viruses different from trojans,
which require users to download them, and worms, which do not use
applications to execute. Many instances of malware fit into multiple
categories: for instance, Stuxnet is a worm, a virus and a rootkit.
• Computer viruses require human action to infect computers and mobile
devices and are often spread through email attachments and internet
downloads.
What does a computer virus do?
• Some computer viruses are programmed to harm your computer by damaging
programs, deleting files, or reformatting the hard drive. Others simply
replicate themselves or flood a network with traffic, making it impossible to
perform any internet activity. Even less harmful computer viruses can
significantly disrupt your system’s performance, sapping computer memory
and causing frequent computer crashes.
How does a computer get a virus?
• Sharing music, files, or photos with other users
• Visiting an infected website
• Opening spam email or an email attachment
• Downloading free games, toolbars, media players and other system utilities
• Installing mainstream software applications without thoroughly reading
license agreements
Computer virus protection
• Use antivirus protection and a firewall
• Get antispyware software
• Always keep your antivirus protection and antispyware software up-to-date
• Update your operating system regularly
• Increase your browser security settings
• Avoid questionable Websites
• Only download software from sites you trust.
• Carefully evaluate free software and file-sharing applications before
downloading them.
• Don't open messages from unknown senders
NETWORK WORMS
• A worm virus refers to a malicious program that replicates itself, automatically
spreading through a network. In this definition of computer worms, the worm
virus exploits vulnerabilities in your security software to steal sensitive
information, install backdoors that can be used to access the system, corrupt
files, and do other kinds of harm.
• Worms consume large volumes of memory, as well as bandwidth. This results in
servers, individual systems, and networks getting overloaded and
malfunctioning. A worm is different from a virus, however, because a worm can
operate on its own while a virus needs a host computer.
• To get a worm in a computer, the worm is often transmitted through
vulnerabilities in software. They could also be sent through email attachments
or within instant messages or spam emails. After a file is opened, it may link the
user to a malicious website or it could download the worm to the user’s device
automatically. After the worm is on the device, it infects it without the user
being able to tell.
How a Worm Spreads
A computer worm takes advantage of system vulnerabilities to accelerate its
spread. It can jump from one device to another through different means, be that
an email attachment, malicious link, or local area network (LAN). Here are the
most common ways a computer worm spreads:
The internet: Most devices connect to the internet via a network, which is a
convenient superhighway for computer worms to spread. Once a worm
infiltrates a device, it can spread to other devices throughout the LAN.
Emails: Have you ever received a suspicious email with a link or an attachment
from a stranger? That’s how some hackers spread malware, including worms.
There are also worms that can make email programs such as Outlook send
emails containing the malware to contacts autonomously.
File-sharing platforms: Unless you know where it’s from, there’s really no
way to tell if the file you’re downloading from a peer-to-peer file sharing
platform contains malware. That’s why worms spread easily through such
platforms.
Smartphones: Smartphones are ideal worm carriers because we tend to
connect our phones to multiple Wi-Fi networks, which could accelerate the
spread of worms.
Removable drives: A flash drive or a removable hard drive can get infected if
plugged into an infected computer. Subsequently, infected removable drives can
spread the worm when they are connected to different computers.
How to Prevent and Get Rid of Computer Worms
On-access scans: Antivirus tools with this feature actively scan your device in
the background to detect and prevent the spread of worms. Since computer
worms self-replicate without human interaction, having your antivirus protect
your device continuously is ideal.
Email scans: The scope of an antivirus’s malware scan includes your email
sometimes. When you open an email that has a link or attachment, the antivirus
scans it first and notifies you if it’s safe to open.
Firewall: Given the ability of computer worms to spread through networks,
an antivirus with a built-in firewall is ideal. If there’s an infected device in your
network, the firewall prevents the worm from entering your other devices.

More Related Content

Similar to VIRUSES.pptx

Similar to VIRUSES.pptx (20)

Computer virus
Computer virusComputer virus
Computer virus
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Malicious
MaliciousMalicious
Malicious
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
COMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdfCOMPUTER VIRUSES AND WORMS.pdf
COMPUTER VIRUSES AND WORMS.pdf
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malwares
MalwaresMalwares
Malwares
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Worm
WormWorm
Worm
 

More from Apoorva812677

Embedded Python Design-1.pptx
Embedded Python Design-1.pptxEmbedded Python Design-1.pptx
Embedded Python Design-1.pptxApoorva812677
 
Templet- internship ppt.pptx
Templet- internship ppt.pptxTemplet- internship ppt.pptx
Templet- internship ppt.pptxApoorva812677
 
Business_Etiquette.ppt
Business_Etiquette.pptBusiness_Etiquette.ppt
Business_Etiquette.pptApoorva812677
 
finaldmamitwalawalkar-180912042546.pptx
finaldmamitwalawalkar-180912042546.pptxfinaldmamitwalawalkar-180912042546.pptx
finaldmamitwalawalkar-180912042546.pptxApoorva812677
 
certification-1 (1).pptx
certification-1 (1).pptxcertification-1 (1).pptx
certification-1 (1).pptxApoorva812677
 
pooja bhagavat IoT.pptx
pooja bhagavat IoT.pptxpooja bhagavat IoT.pptx
pooja bhagavat IoT.pptxApoorva812677
 
cybersecurity ppt.pptx
cybersecurity ppt.pptxcybersecurity ppt.pptx
cybersecurity ppt.pptxApoorva812677
 

More from Apoorva812677 (9)

Embedded Python Design-1.pptx
Embedded Python Design-1.pptxEmbedded Python Design-1.pptx
Embedded Python Design-1.pptx
 
Templet- internship ppt.pptx
Templet- internship ppt.pptxTemplet- internship ppt.pptx
Templet- internship ppt.pptx
 
Business_Etiquette.ppt
Business_Etiquette.pptBusiness_Etiquette.ppt
Business_Etiquette.ppt
 
CCNA Course.pptx
CCNA Course.pptxCCNA Course.pptx
CCNA Course.pptx
 
finaldmamitwalawalkar-180912042546.pptx
finaldmamitwalawalkar-180912042546.pptxfinaldmamitwalawalkar-180912042546.pptx
finaldmamitwalawalkar-180912042546.pptx
 
certification-1 (1).pptx
certification-1 (1).pptxcertification-1 (1).pptx
certification-1 (1).pptx
 
pooja bhagavat IoT.pptx
pooja bhagavat IoT.pptxpooja bhagavat IoT.pptx
pooja bhagavat IoT.pptx
 
cybersecurity ppt.pptx
cybersecurity ppt.pptxcybersecurity ppt.pptx
cybersecurity ppt.pptx
 
Life skill ppt.pptx
Life skill ppt.pptxLife skill ppt.pptx
Life skill ppt.pptx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

VIRUSES.pptx

  • 1. VIRUSES • A virus is a piece of code that inserts itself into an application and executes when the app is run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks or conduct ransomware attacks. • A virus cannot execute or reproduce unless the app it has infected is running. This dependence on a host application makes viruses different from trojans, which require users to download them, and worms, which do not use applications to execute. Many instances of malware fit into multiple categories: for instance, Stuxnet is a worm, a virus and a rootkit. • Computer viruses require human action to infect computers and mobile devices and are often spread through email attachments and internet downloads.
  • 2. What does a computer virus do? • Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes. How does a computer get a virus? • Sharing music, files, or photos with other users • Visiting an infected website • Opening spam email or an email attachment • Downloading free games, toolbars, media players and other system utilities • Installing mainstream software applications without thoroughly reading license agreements
  • 3. Computer virus protection • Use antivirus protection and a firewall • Get antispyware software • Always keep your antivirus protection and antispyware software up-to-date • Update your operating system regularly • Increase your browser security settings • Avoid questionable Websites • Only download software from sites you trust. • Carefully evaluate free software and file-sharing applications before downloading them. • Don't open messages from unknown senders
  • 4. NETWORK WORMS • A worm virus refers to a malicious program that replicates itself, automatically spreading through a network. In this definition of computer worms, the worm virus exploits vulnerabilities in your security software to steal sensitive information, install backdoors that can be used to access the system, corrupt files, and do other kinds of harm. • Worms consume large volumes of memory, as well as bandwidth. This results in servers, individual systems, and networks getting overloaded and malfunctioning. A worm is different from a virus, however, because a worm can operate on its own while a virus needs a host computer. • To get a worm in a computer, the worm is often transmitted through vulnerabilities in software. They could also be sent through email attachments or within instant messages or spam emails. After a file is opened, it may link the user to a malicious website or it could download the worm to the user’s device automatically. After the worm is on the device, it infects it without the user being able to tell.
  • 5. How a Worm Spreads A computer worm takes advantage of system vulnerabilities to accelerate its spread. It can jump from one device to another through different means, be that an email attachment, malicious link, or local area network (LAN). Here are the most common ways a computer worm spreads: The internet: Most devices connect to the internet via a network, which is a convenient superhighway for computer worms to spread. Once a worm infiltrates a device, it can spread to other devices throughout the LAN. Emails: Have you ever received a suspicious email with a link or an attachment from a stranger? That’s how some hackers spread malware, including worms. There are also worms that can make email programs such as Outlook send emails containing the malware to contacts autonomously. File-sharing platforms: Unless you know where it’s from, there’s really no way to tell if the file you’re downloading from a peer-to-peer file sharing platform contains malware. That’s why worms spread easily through such platforms. Smartphones: Smartphones are ideal worm carriers because we tend to connect our phones to multiple Wi-Fi networks, which could accelerate the spread of worms. Removable drives: A flash drive or a removable hard drive can get infected if plugged into an infected computer. Subsequently, infected removable drives can spread the worm when they are connected to different computers.
  • 6. How to Prevent and Get Rid of Computer Worms On-access scans: Antivirus tools with this feature actively scan your device in the background to detect and prevent the spread of worms. Since computer worms self-replicate without human interaction, having your antivirus protect your device continuously is ideal. Email scans: The scope of an antivirus’s malware scan includes your email sometimes. When you open an email that has a link or attachment, the antivirus scans it first and notifies you if it’s safe to open. Firewall: Given the ability of computer worms to spread through networks, an antivirus with a built-in firewall is ideal. If there’s an infected device in your network, the firewall prevents the worm from entering your other devices.