SlideShare a Scribd company logo
COMPUTER
VIRUSES
Presented by:

Aditi Ambekar
Angela Mary Binoy
Annies Minu SathiyaSeelan
SICK OF COMPUTER
VIRUSES?

What they are…
Where they come from…
Why they are here…
Index
1. History

2.Concept
3. Symptoms
4. Types Of Infections
6. Types Of Viruses
7.Conclusion
• The first computer virus was
called “Creeper.”It was
invented in the early
1970’s.Since then, millions of
viruses have been invented.
• The first known computer
virus was written in 1981 by a
man named Rich Skrenta . This
virus was termed Elk Cloner,
and was the first computer
virus to appear outside the
computer where it was
created in.
Virus +

DEATH
• A Computer Virus is a
program that can copy itself
and infect a computer
without the permission or
knowledge of the user.
• A Computer Virus has 2
major characteristics: the
ability to replicate itself, and
the ability to attach itself to
another computer file...
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
• Extensive pop-up ads.
• Inability to open files with existing passwords.
Malware

Viruses

Worms

Trojan
Horses
1.
2.
3.
4.
5.
6.
7.
8.

Boot Sector Virus.
Direct Action Virus.
File Infector Virus.
Macro Virus.
Multipartite Virus.
Polymorphic Virus.
Resident Virus.
Web Scripting Virus.
It places its own codes
and commands into
MBR.
Alters the search and
error page of a
browser and redirects
the user to its own
page.
•They load with the host program into
computer’s memory.
•They can be crafted with relative ease.
File Infector Virus
A file infector is a virus that infects an
executable file.

Typically affects only one type of file.
Macro Virus
• These type of virus infects word , excel,
PowerPoint, access and other data files.
Once infected repairing of these files is
very much difficult.
• May attack in more than one methods.
• A virus that can
encrypt its code in
different ways so
that it appears
differently in each
infection. These
viruses are more
difficult to detect.
•
•
•
•

Hides within the computers memory.
It activates whenever the OS loads or operates.
This virus may be pernicious.
It is of 2 types:
Fast Infector.
Slow Infector.
• Removal of this virus is bit tricky.
• It may be designed to block the actions of Anti
Virus programs.
There are few website that execute complex
code with the purpose to provide interesting
content ,these codes often get exploited and
due to this a virus becomes able to infect a
machine and to take actions on a machine via
website. This particular virus is called web
scripting virus
Computer Viruses
Computer Viruses
Infects computers running with
Microsoft Windows.
Discovered by IT security firm Seculert,
in December 2012.
Steals confidential data of the user.
Affects POS i.e. Point of sales.
Detected in online banking transaction
space on 19 January 2014 in India.
Computer Viruses
In 2012, a major ransom ware worm known as
Reveton began to spread.
A Reveton is a malware which attempts to
extort money from a user.
It claims that your computer has been used for
unauthorized activities.
Computer Viruses
Computer Viruses
Encrypting ransom ware appeared in 2013 with
a worm known as "Crypto Locker”.
It gets Distributed either as an attachment to a
malicious e-mail or as a drive-by download.
CryptoLocker demands a payment with either a
MoneyPak card or Bitcoin to recover the key.
CryptoLocker to be extremely difficult to repair.
THANK YOU!

More Related Content

PPTX
Computer Virus powerpoint presentation
PPTX
Computer virus
PPTX
Computer Virus
PPTX
Presentation on Computer Viruses
PPTX
Computer virus and anti virus presentation
PPTX
Computer virus and antivirus
PDF
Internet surfing and security
PPTX
Personal information
Computer Virus powerpoint presentation
Computer virus
Computer Virus
Presentation on Computer Viruses
Computer virus and anti virus presentation
Computer virus and antivirus
Internet surfing and security
Personal information

What's hot (20)

PPT
Ppt on different types of computer viruses
PPTX
Operating system
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPT
Types of software
PPTX
PPTX
Computer security threats & prevention
PPTX
Operating systems
PPTX
Computer Software & its Types
ODP
Virus and antivirus final ppt
PPTX
Computer worms viruses and Prevention
PPT
Computer Worms
PPT
Presentation on computer software
PPTX
Antivirus software
PPT
How Computer Viruses Work
PPT
Fundamental of Computers
PPTX
Threats to a computer
PPT
Presentation on computer viruses
PPTX
Computer Software & It's types.
PPTX
Introduction to internet
PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
Ppt on different types of computer viruses
Operating system
ANTIVIRUS AND VIRUS Powerpoint presentation
Types of software
Computer security threats & prevention
Operating systems
Computer Software & its Types
Virus and antivirus final ppt
Computer worms viruses and Prevention
Computer Worms
Presentation on computer software
Antivirus software
How Computer Viruses Work
Fundamental of Computers
Threats to a computer
Presentation on computer viruses
Computer Software & It's types.
Introduction to internet
Virus and Anti Virus - Types of Virus and Anti Virus
Ad

Similar to Computer Viruses (20)

PPTX
Computer viruses
PPTX
PPTX
Cause and effects of computer virus
PPTX
Computer Introduction (Computer Viruses )-Lecture04
PPT
computervirus.ppt
PPTX
Virus and its types 2
PDF
Computer/Cyber/IT Security MCQ Questions
DOC
Proyecto7
PPTX
computer viruses
PPT
Malicious
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
Computer viruses and its advantages.pptx
PPTX
Virus and malware presentation
PPTX
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
PPTX
Computer Introduction-Lecture04
PDF
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
PDF
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
PPTX
lecture-11-30052022-103626am.pptx
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PPT
Rajul computer presentation
Computer viruses
Cause and effects of computer virus
Computer Introduction (Computer Viruses )-Lecture04
computervirus.ppt
Virus and its types 2
Computer/Cyber/IT Security MCQ Questions
Proyecto7
computer viruses
Malicious
Get Smart about Ransomware: Protect Yourself and Organization
Computer viruses and its advantages.pptx
Virus and malware presentation
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
Computer Introduction-Lecture04
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
lecture-11-30052022-103626am.pptx
Unit 6_keylogger_Spywares_virus_worms.pdf
Rajul computer presentation
Ad

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Cell Structure & Organelles in detailed.
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
01-Introduction-to-Information-Management.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
TR - Agricultural Crops Production NC III.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Cell Structure & Organelles in detailed.
Basic Mud Logging Guide for educational purpose
Renaissance Architecture: A Journey from Faith to Humanism
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
Week 4 Term 3 Study Techniques revisited.pptx
VCE English Exam - Section C Student Revision Booklet
01-Introduction-to-Information-Management.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPH.pptx obstetrics and gynecology in nursing

Computer Viruses

  • 1. COMPUTER VIRUSES Presented by: Aditi Ambekar Angela Mary Binoy Annies Minu SathiyaSeelan
  • 2. SICK OF COMPUTER VIRUSES? What they are… Where they come from… Why they are here…
  • 3. Index 1. History 2.Concept 3. Symptoms 4. Types Of Infections 6. Types Of Viruses 7.Conclusion
  • 4. • The first computer virus was called “Creeper.”It was invented in the early 1970’s.Since then, millions of viruses have been invented. • The first known computer virus was written in 1981 by a man named Rich Skrenta . This virus was termed Elk Cloner, and was the first computer virus to appear outside the computer where it was created in.
  • 6. • A Computer Virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. • A Computer Virus has 2 major characteristics: the ability to replicate itself, and the ability to attach itself to another computer file...
  • 7. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • Extensive pop-up ads. • Inability to open files with existing passwords.
  • 9. 1. 2. 3. 4. 5. 6. 7. 8. Boot Sector Virus. Direct Action Virus. File Infector Virus. Macro Virus. Multipartite Virus. Polymorphic Virus. Resident Virus. Web Scripting Virus.
  • 10. It places its own codes and commands into MBR.
  • 11. Alters the search and error page of a browser and redirects the user to its own page.
  • 12. •They load with the host program into computer’s memory. •They can be crafted with relative ease.
  • 13. File Infector Virus A file infector is a virus that infects an executable file. Typically affects only one type of file.
  • 14. Macro Virus • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 15. • May attack in more than one methods.
  • 16. • A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
  • 17. • • • • Hides within the computers memory. It activates whenever the OS loads or operates. This virus may be pernicious. It is of 2 types: Fast Infector. Slow Infector. • Removal of this virus is bit tricky. • It may be designed to block the actions of Anti Virus programs.
  • 18. There are few website that execute complex code with the purpose to provide interesting content ,these codes often get exploited and due to this a virus becomes able to infect a machine and to take actions on a machine via website. This particular virus is called web scripting virus
  • 21. Infects computers running with Microsoft Windows. Discovered by IT security firm Seculert, in December 2012. Steals confidential data of the user. Affects POS i.e. Point of sales. Detected in online banking transaction space on 19 January 2014 in India.
  • 23. In 2012, a major ransom ware worm known as Reveton began to spread. A Reveton is a malware which attempts to extort money from a user. It claims that your computer has been used for unauthorized activities.
  • 26. Encrypting ransom ware appeared in 2013 with a worm known as "Crypto Locker”. It gets Distributed either as an attachment to a malicious e-mail or as a drive-by download. CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key. CryptoLocker to be extremely difficult to repair.