SlideShare a Scribd company logo
By
     RAVITEJA
 the most high-profile threats to information
integrity is the computer virus.


The most sophisticated threats to computer
systems are presented by programs that exploit the
vulnerabilities in computing systems


Malware has a mechanism to replicate and
propagate itself. The different types of malware are:
Trap doors, logic bombs, trojan horses, viruses,
worms and zombies.
Worms
Spam
Virus Hoaxes
Trojan Horses
Adware
Spyware
Malware
Computer viruses
 Boot viruses
 Program viruses
 Polymorphic viruses
 Stealth viruses
 Macro viruses
 Network viruses
 Multipartite Viruses
Boot viruses:
 These viruses infect floppy disk.
 These viruses load into memory if the
computer tries to read the disk while it is
booting.
Boot sector viruses can be created without
much difficulty and infect either the Master boot
record of the hard disk or the floppy drive.
program viruses:

 They infect program files like files with
extensions like .EXE, .COM , .BIN , .DRV and .SYS.
Some file viruses just replicate while others destroy
the program being used at that time.
when executed they load the virus in the
memory along with the program and perform the
predefined steps and infect the system
STEALTH VIRUSES:

 These viruses steals computers memory.
 They viruses are use various methods to hide
themselves and to avoid detection.
POLYMORPHIC
            VIRUSES:
 These viruses are more difficult to detect
They have the ability to mutate this means that
they change the viral code known as the signature
each time it spreads or infects.
macro viruses:
 A macro virus is a new type of computer virus
that infects macros with in a document.
In essence, a macro is an executable program
embedded in a word processing document or other
type of file. Typically users employ macros to
automate repetitive tasks and there by save key
strokes.
network virus:

 These viruses rapidly spreads through
LAN and internet.




                           INTERNET
      LAN
Multipartite Viruses
Multipartite viruses are the hybrid variety; they
can be best described as a cross between both
Boot Viruses and File viruses. They not only infect
files but also infect the boot sector.
Computer viruses
The ideal solution to the threat of viruses is
prevention. Do not allow a virus is get into the system in first
place. This goal is in general difficult to achieve, although
prevention can reduce the no: of successful viral attacks..

Detection: Once the infection has occurred, determine that it
has occurred and locate the virus.
Identification: Once detection has been achieved, identify the
specific virus has infected a program.
Removal: Once the specific virus has been identified, remove all
traces of the virus from the infected program and restore it to its
original state.

        Advances in viruses and antivirus technology go hand in
hand. As the virus arms race has evolved, both viruses and
antivirus software have grown more complex and sophisticated
Computer viruses
Usage of the “good-virus” in Centralized Anti-Virus Update:
The person responsible for maintaining the virus protection has to go personally to each
computer and download the new version of the package manually from the server, the situation
has not improved very much.

One segment of the worm will constantly monitor the logins. Each time a workstations
attempts to login, that segment automatically queries that workstation whether it is running the
anti-virus product and which version of it.

Affirmation to “good virus” Norms:

It conforms to the Control requirement as the virus attempts to spread only on the computers
attempting to access the network on which it is running.

In fact, the replication code will not be copied, if they are not needed. The fact that it is a worm
and spreads as a whole on the network makes it relatively easy to fulfill the requirement too.

Since the "virus" modifies only old copies of itself and does not touch other programs, no
compatibility problems due to its virus-like behavior will occur.
Computer viruses are not evil and that programmers have a
right to create them, posses them and experiment with them.
 But we should never support those people who writing
viruses with destructive nature
Thus it can be effectively proved that it is possible to use the
concept of a virus for beneficial purposes.
The future might use this technology for tedious and resource
consuming jobs like software updates, system maintenance
and intruder detection.
The “good viruses” are capable of annihilating their malicious
counterparts
1. The Little Black book of Computer Viruses (electronic
   edition) By Mark A. Ludwig
2. An Undetectable Computer Virus by David Chess and Steve
   White, presented at the Virus Bulletin Conference,
   September 2000 [PDF version]
3. Fred Cohen, Computer Viruses - Theory and Experiments,
   Computer Security: A Global Challenge, Elsevier Science
   Publishers B. V. (North-Holland), 1984, pp. 143-158.
4. Fred Cohen, Models of Practical Defenses against Computer
   Viruses, Computers Security, 8 (1989), 2, pp. 149-160.
5. Nachenberg, C. “Computer Virus-Antivirus Coevolution.”
   Communications of the ACM.
6. Computational Aspects of Computer Viruses by Fred Cohen
7. Trends in Computer Virus Research by Fred Cohen
8. Methodology of Computer Anti-Virus Research by Vesselin
   Bontchev
Computer viruses
Computer viruses

More Related Content

PPTX
PPTX
Virus and Anti virus
PPTX
PPTX
Cybercrime: Virus and Defense
PPTX
Virus and worms analysis
PPTX
Virus soran university
PPTX
Virus
PPT
Virus and Anti virus
Cybercrime: Virus and Defense
Virus and worms analysis
Virus soran university
Virus

What's hot (20)

PPT
Computer viruses
PPTX
Virus slides
DOCX
Network virus detection & prevention
PPTX
PPTX
Computer Virus powerpoint presentation
PPTX
Computer virus
PPTX
Computer virus and worms
PPTX
Computer virus !!!!!
PPTX
Computer virus
PPTX
ethical hacking.pptx
PPT
As computer virus
PPTX
Computer viruses and prevention techniques
PPTX
What is a virus and anti virus
PPTX
Major Computer Virus Types to Watch Out
PPT
Virus part2
PPTX
Virus-Awareness
PPTX
Virus and worms
PPTX
computer Virus
PPTX
Computer virus
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
Computer viruses
Virus slides
Network virus detection & prevention
Computer Virus powerpoint presentation
Computer virus
Computer virus and worms
Computer virus !!!!!
Computer virus
ethical hacking.pptx
As computer virus
Computer viruses and prevention techniques
What is a virus and anti virus
Major Computer Virus Types to Watch Out
Virus part2
Virus-Awareness
Virus and worms
computer Virus
Computer virus
ANTIVIRUS AND VIRUS Powerpoint presentation
Ad

Similar to Computer viruses (20)

PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Virus vs anti virus
PPTX
Viruses and virus countetmeasures
PPTX
Virus and antivirus
PPTX
Computer Viruses- B S Kalyan Chakravarthy
DOCX
What is a computer virus
PPTX
Computer virus
PPTX
PPT on information technology laws description
PPTX
Firewall , Viruses and Antiviruses
PDF
Malicious software
PPT
Rajul computer presentation
PPTX
Computer viruses
PPT
Virus, Worms And Antivirus
PPTX
Virus and Antivirus
PDF
A short course on computer viruses
PPT
Virus project
PPTX
Introductio to Virus
PPT
Computer Viruses and Classification lecture slides ppt
PPTX
Securing The Computer From Viruses ...
PPTX
Computer virus
Virus and its CounterMeasures -- Pruthvi Monarch
Virus vs anti virus
Viruses and virus countetmeasures
Virus and antivirus
Computer Viruses- B S Kalyan Chakravarthy
What is a computer virus
Computer virus
PPT on information technology laws description
Firewall , Viruses and Antiviruses
Malicious software
Rajul computer presentation
Computer viruses
Virus, Worms And Antivirus
Virus and Antivirus
A short course on computer viruses
Virus project
Introductio to Virus
Computer Viruses and Classification lecture slides ppt
Securing The Computer From Viruses ...
Computer virus
Ad

More from Raviteja Chowdary Adusumalli (14)

PPT
Testing fundamentals
PPT
Oracle Sql & PLSQL Complete guide
PPT
Softskill brief description,the way to change our attitude
PPT
Introduction to phishing
PPT
Brain fingerprinting tech
PPTX
Geographic inf system
PPTX
Ethical hacking (2)
PPT
Free space optics
PPT
Wearable computer
PPTX
Image processing ppt
PPT
Surface computing by raviteja
Testing fundamentals
Oracle Sql & PLSQL Complete guide
Softskill brief description,the way to change our attitude
Introduction to phishing
Brain fingerprinting tech
Geographic inf system
Ethical hacking (2)
Free space optics
Wearable computer
Image processing ppt
Surface computing by raviteja

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Unlocking AI with Model Context Protocol (MCP)

Computer viruses

  • 1. By RAVITEJA
  • 2.  the most high-profile threats to information integrity is the computer virus. The most sophisticated threats to computer systems are presented by programs that exploit the vulnerabilities in computing systems Malware has a mechanism to replicate and propagate itself. The different types of malware are: Trap doors, logic bombs, trojan horses, viruses, worms and zombies.
  • 5.  Boot viruses  Program viruses  Polymorphic viruses  Stealth viruses  Macro viruses  Network viruses  Multipartite Viruses
  • 6. Boot viruses:  These viruses infect floppy disk.  These viruses load into memory if the computer tries to read the disk while it is booting. Boot sector viruses can be created without much difficulty and infect either the Master boot record of the hard disk or the floppy drive.
  • 7. program viruses:  They infect program files like files with extensions like .EXE, .COM , .BIN , .DRV and .SYS. Some file viruses just replicate while others destroy the program being used at that time. when executed they load the virus in the memory along with the program and perform the predefined steps and infect the system
  • 8. STEALTH VIRUSES:  These viruses steals computers memory.  They viruses are use various methods to hide themselves and to avoid detection.
  • 9. POLYMORPHIC VIRUSES:  These viruses are more difficult to detect They have the ability to mutate this means that they change the viral code known as the signature each time it spreads or infects.
  • 10. macro viruses:  A macro virus is a new type of computer virus that infects macros with in a document. In essence, a macro is an executable program embedded in a word processing document or other type of file. Typically users employ macros to automate repetitive tasks and there by save key strokes.
  • 11. network virus:  These viruses rapidly spreads through LAN and internet. INTERNET LAN
  • 12. Multipartite Viruses Multipartite viruses are the hybrid variety; they can be best described as a cross between both Boot Viruses and File viruses. They not only infect files but also infect the boot sector.
  • 14. The ideal solution to the threat of viruses is prevention. Do not allow a virus is get into the system in first place. This goal is in general difficult to achieve, although prevention can reduce the no: of successful viral attacks.. Detection: Once the infection has occurred, determine that it has occurred and locate the virus. Identification: Once detection has been achieved, identify the specific virus has infected a program. Removal: Once the specific virus has been identified, remove all traces of the virus from the infected program and restore it to its original state. Advances in viruses and antivirus technology go hand in hand. As the virus arms race has evolved, both viruses and antivirus software have grown more complex and sophisticated
  • 16. Usage of the “good-virus” in Centralized Anti-Virus Update: The person responsible for maintaining the virus protection has to go personally to each computer and download the new version of the package manually from the server, the situation has not improved very much. One segment of the worm will constantly monitor the logins. Each time a workstations attempts to login, that segment automatically queries that workstation whether it is running the anti-virus product and which version of it. Affirmation to “good virus” Norms: It conforms to the Control requirement as the virus attempts to spread only on the computers attempting to access the network on which it is running. In fact, the replication code will not be copied, if they are not needed. The fact that it is a worm and spreads as a whole on the network makes it relatively easy to fulfill the requirement too. Since the "virus" modifies only old copies of itself and does not touch other programs, no compatibility problems due to its virus-like behavior will occur.
  • 17. Computer viruses are not evil and that programmers have a right to create them, posses them and experiment with them.  But we should never support those people who writing viruses with destructive nature Thus it can be effectively proved that it is possible to use the concept of a virus for beneficial purposes. The future might use this technology for tedious and resource consuming jobs like software updates, system maintenance and intruder detection. The “good viruses” are capable of annihilating their malicious counterparts
  • 18. 1. The Little Black book of Computer Viruses (electronic edition) By Mark A. Ludwig 2. An Undetectable Computer Virus by David Chess and Steve White, presented at the Virus Bulletin Conference, September 2000 [PDF version] 3. Fred Cohen, Computer Viruses - Theory and Experiments, Computer Security: A Global Challenge, Elsevier Science Publishers B. V. (North-Holland), 1984, pp. 143-158. 4. Fred Cohen, Models of Practical Defenses against Computer Viruses, Computers Security, 8 (1989), 2, pp. 149-160. 5. Nachenberg, C. “Computer Virus-Antivirus Coevolution.” Communications of the ACM. 6. Computational Aspects of Computer Viruses by Fred Cohen 7. Trends in Computer Virus Research by Fred Cohen 8. Methodology of Computer Anti-Virus Research by Vesselin Bontchev