SlideShare a Scribd company logo
1 of 10
Name : Ganesh Dilip Kamble
Batch No : BCBF 2018-2578 CITI
What is Computer Virus ?
A Computer Virus Is A Type Of Malicious Software
That, When Executed, Replicates Itself By
Modifying Other Computer Programs And Inserting
Its Own Code. The Term "Virus" Is Also Commonly,
But Erroneously, Used To Refer To Other Types Of
Malware.
He Term 'Computer Virus' Was First Formally Defined By Fred Cohen In 1983.
Types of Computer Virus
1. Boot Sector 2. File Infection 3. Overwrite
4. Worm 5. Trojan 6. Ransomware
Ransomware Is A Type Of Malware That Prevents You
From Using Your Computer Or Accessing Certain Files
Unless You Pay A Ransom. It Often Encrypts Files So
That They Cannot Be Opened.
Ransomware
Starting from Around 2012 The Use of Ransomware
Scams Has Grown Internationally.
There Have Been 181.5 Million Ransomware Attacks
in The First Six Months of 2018.
Examples Of Ransomware.
WannaCry NotPetya Bad Rabbit
Reveton CryptoLocker CryptoWall
Before Affected Ransomware After Affected Ransomware
How To Work Ransomware
If Your Computer Is Infected with Ransomware.
If You Have a Recent System Backup, You Can Revert to A
Saved State Before the Ransomware Infected Your
Computer
Search for an Internet Security Utility That Can
Remove the Specific Ransomware Installed On Your
System.
Pay The Ransomware Fee and Contact Your Bank or
Credit Card Company to Block the Transaction
What is Computer Virus & Ransomware

More Related Content

What's hot

Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
Azri Abdin
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Imran Khan
 

What's hot (20)

Computer virus
Computer virusComputer virus
Computer virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMY
 
Worm
WormWorm
Worm
 
Ids 006 computer worms
Ids 006 computer wormsIds 006 computer worms
Ids 006 computer worms
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Different Types Of Computer Viruses
Different Types Of Computer VirusesDifferent Types Of Computer Viruses
Different Types Of Computer Viruses
 
Virus
VirusVirus
Virus
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus !!!!!
Computer virus !!!!!Computer virus !!!!!
Computer virus !!!!!
 

Similar to What is Computer Virus & Ransomware

All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
Kahir_alrawi
 
Please read below and respond with 150 words or more in your own opi.docx
Please read below and respond with 150 words or more in your own opi.docxPlease read below and respond with 150 words or more in your own opi.docx
Please read below and respond with 150 words or more in your own opi.docx
SONU61709
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 

Similar to What is Computer Virus & Ransomware (20)

Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
File000145
File000145File000145
File000145
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...A comprehensive survey ransomware attacks prevention, monitoring and damage c...
A comprehensive survey ransomware attacks prevention, monitoring and damage c...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
A Comprehensive Survey: Ransomware Attacks Prevention, Monitoring and Damage ...
 
Malware
MalwareMalware
Malware
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
virus
virusvirus
virus
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Please read below and respond with 150 words or more in your own opi.docx
Please read below and respond with 150 words or more in your own opi.docxPlease read below and respond with 150 words or more in your own opi.docx
Please read below and respond with 150 words or more in your own opi.docx
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Internet threat
Internet threatInternet threat
Internet threat
 

Recently uploaded

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Recently uploaded (20)

LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

What is Computer Virus & Ransomware

  • 1. Name : Ganesh Dilip Kamble Batch No : BCBF 2018-2578 CITI
  • 3. A Computer Virus Is A Type Of Malicious Software That, When Executed, Replicates Itself By Modifying Other Computer Programs And Inserting Its Own Code. The Term "Virus" Is Also Commonly, But Erroneously, Used To Refer To Other Types Of Malware. He Term 'Computer Virus' Was First Formally Defined By Fred Cohen In 1983.
  • 4. Types of Computer Virus 1. Boot Sector 2. File Infection 3. Overwrite 4. Worm 5. Trojan 6. Ransomware
  • 5. Ransomware Is A Type Of Malware That Prevents You From Using Your Computer Or Accessing Certain Files Unless You Pay A Ransom. It Often Encrypts Files So That They Cannot Be Opened. Ransomware Starting from Around 2012 The Use of Ransomware Scams Has Grown Internationally. There Have Been 181.5 Million Ransomware Attacks in The First Six Months of 2018.
  • 6. Examples Of Ransomware. WannaCry NotPetya Bad Rabbit Reveton CryptoLocker CryptoWall
  • 7. Before Affected Ransomware After Affected Ransomware How To Work Ransomware
  • 8. If Your Computer Is Infected with Ransomware.
  • 9. If You Have a Recent System Backup, You Can Revert to A Saved State Before the Ransomware Infected Your Computer Search for an Internet Security Utility That Can Remove the Specific Ransomware Installed On Your System. Pay The Ransomware Fee and Contact Your Bank or Credit Card Company to Block the Transaction