Similarities B/w Biological & Computer Virus.
How Does A Virus Work?
Life Cycle Of Computer Virus.
Functional Diagram of VIRUS.
Types Of VIRUS.
Methods Of Detecting Virus By ANTI-VIRUS.
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and run against your wish.
A virus is illegal computer code that can do such things as alter programs or
destroy data. Also, the virus can copy itself onto programs, thereby spreading
its damaging effects.
Similarities between biological virus
and computer virus:
Computer virus are called viruses because they share some of the traits of biological
Viruses. A computer virus passed from computer to computer like a biological virus
Passes from person to person
• Need a host for residence.
• Capable of self-replicate.
• Cause damage to host.
How Does A VIRUS Spread?
first the virus is linked to the host object in such a
way that it activates when the host
object is used.
Second virus looks for other suitable carrier
objects and attaches itself to them.
With this dependency virus slows down the system.
How does a virus work?
The virus waits until user transmits the
infected object to another computer
User transmits an infected object to another
The virus locates and infects suitable objects
on the new computer
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded into
main memory and destroys the data
stored in hard disk.
BOOT SECTOR VIRUS
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
A worm is also a destructive program
that fills a computer system with self-
Types of WORMS VIRUS:
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
Signature-Based Detection-Compare the
contents of a file to a dictionary of virus.
Behavior -Based Detection:
Observe how the program execute in the computer
Rather than looking for signature .
Check the suspicious file and show warnings to the
Heuristic -Based Detection:
Detect and remove all threats.
Create a generic signature.
Don't share Drive C: without a password and
without read-only restrictions.
Delete e-mail file attachments.
Have multiple backups of important files.
More secure operating systems