SlideShare a Scribd company logo
COMPUTER VIRUS
AND
SECURITY
PRESENTED BY
Group 2
COMPUTER
VIRUS
A COMPUTER VIRUS IS A MALICIOUS
SOFTWARE PROGRAM DESIGNED TO
DISRUPT, DAMAGE, OR GAIN
UNAUTHORIZED ACCESS TO
COMPUTER SYSTEMS.
• Named after biological viruses
due to their ability to replicate
and spread.
• First virus: "Creeper" in the
1970s.
Computer viruses can replicate
themselves and spread from one file or
system to another without user
intervention.
Once activated, viruses execute
harmful actions, such as deleting files,
stealing data, or disrupting system
operations.
They often remain dormant until
specific conditions, such as a date or a
file being opened, are met
Viruses use advanced methods like
encryption and code obfuscation to
avoid being detected by antivirus
software.
CHARACTERISTICS OF
VIRUS
Attach themselves to executable files
and spread when the file is run.
File Infector Virus
Target macros in applications like
Microsoft Word or Excel.
Macro Virus
Infects the boot sector of a storage
device.
Boot Sector Virus
TYPES OF VIRUSES
Encrypts user data and demands
payment for its release.
Ransomware
Self-replicating programs that
spread across networks without
user action.
Worms
Disguise themselves as legitimate
programs but perform malicious
activities.
Trojan Horse
TYPES OF VIRUSES
Signs of Virus Infection
• Slow computer performance.
• Frequent crashes or error messages.
• Unusual pop-ups or advertisements.
• Unauthorized data access or deletion.
METHODS
OF
SPREAD
Email
Attachments:
Fake messages
containing
malicious files.
Removable
Media:
USB drives
and external
hard drives.
Infected
Downloads:
Software or
media from
untrusted
sources.
PREVENTIVE
MEASURES
OR
SECURITY
Individual-Level
Security
• Install and update antivirus software.
• Regularly update operating systems
and software.
• Avoid clicking unknown links or
downloading from untrusted sources
Organization-Level
Security
• Use firewalls to monitor
network traffic.
• Train employees about
phishing and cyber threats.
• Regular data backups and
disaster recovery plans.
Advanced Security
Solutions
• Two-Factor Authentication (2FA).
• Virtual Private Network (VPN).
• Encryption for sensitive data.
• Security training for employees.
A.I IN
DETECTING
AND
PREVENTING
VIRUSES
A.I IN
DETECTING
VIRUS
Machine Learning:
Flags abnormal system behavior
Anomaly Detection:
Spot new, unknown viruses
Real-Time Monitoring:
Scans for threats continuously
A.I IN
PREVENTING VIRUS
Automated Response:
AI blocks or isolates threats
Predictive Analysis:
Forecasts virus outbreaks
Adaptive Security:
Adjusts to new virus types
CASE STUDY
WannaCry Ransomware Attack
• It occurred in 2017, affecting over 200,000 systems globally.
• Exploited a vulnerability in Microsoft Windows.
• Demanded payment in Bitcoin for file decryption.
CONCLUSION
• Stay informed about threats.
• Regularly update and protect systems.
• Adopt safe online practices.
“ An ounce of prevention is worth a pound of
cure."
THANK
YOU

More Related Content

PPTX
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
PPTX
BAIT1003 Chapter 11
PPTX
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
PPT
Itc lec 15 Computer security risks
PPTX
Computer Security 101
PDF
Computer virus: a threat to computer and user
PPTX
Week_7.pptx Computer science topic 7 Notes
PPTX
Cyber crime , threats and their security measures
CYBER SECURITY AWARENESS TRAINING FOR FINANCE PROFESSIONALS
BAIT1003 Chapter 11
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
Itc lec 15 Computer security risks
Computer Security 101
Computer virus: a threat to computer and user
Week_7.pptx Computer science topic 7 Notes
Cyber crime , threats and their security measures

Similar to computer viruses and security and preventive measures (20)

PDF
Computer viruses
ODP
Viruses andthreats@dharmesh
DOC
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
PPT
Computer virus and antivirus
PPTX
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
PPTX
Computer Virus ppt.pptx
PPTX
Preventing Viruses and other Malicious Code.pptx
PPT
networkmanagementandsecurity-160406183558.ppt
PPT
Network management and security
PPTX
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
PPTX
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
PDF
Computer/Cyber/IT Security MCQ Questions
PDF
Network and Information security_new2.pdf
PPT
Computer security
PPTX
The Demand For Security: information security program
PPT
Application'sand security
PPTX
Cybersecurity Training
PPTX
Basics of Network Security
PPT
Security issues in the wireless networks.ppt
PPT
viruses
Computer viruses
Viruses andthreats@dharmesh
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
Computer virus and antivirus
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
Computer Virus ppt.pptx
Preventing Viruses and other Malicious Code.pptx
networkmanagementandsecurity-160406183558.ppt
Network management and security
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
Computer/Cyber/IT Security MCQ Questions
Network and Information security_new2.pdf
Computer security
The Demand For Security: information security program
Application'sand security
Cybersecurity Training
Basics of Network Security
Security issues in the wireless networks.ppt
viruses
Ad

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Lesson notes of climatology university.
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Structure & Organelles in detailed.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Anesthesia in Laparoscopic Surgery in India
Insiders guide to clinical Medicine.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Renaissance Architecture: A Journey from Faith to Humanism
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Lesson notes of climatology university.
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
Sports Quiz easy sports quiz sports quiz
Anesthesia in Laparoscopic Surgery in India
Ad

computer viruses and security and preventive measures

  • 2. COMPUTER VIRUS A COMPUTER VIRUS IS A MALICIOUS SOFTWARE PROGRAM DESIGNED TO DISRUPT, DAMAGE, OR GAIN UNAUTHORIZED ACCESS TO COMPUTER SYSTEMS. • Named after biological viruses due to their ability to replicate and spread. • First virus: "Creeper" in the 1970s.
  • 3. Computer viruses can replicate themselves and spread from one file or system to another without user intervention. Once activated, viruses execute harmful actions, such as deleting files, stealing data, or disrupting system operations. They often remain dormant until specific conditions, such as a date or a file being opened, are met Viruses use advanced methods like encryption and code obfuscation to avoid being detected by antivirus software. CHARACTERISTICS OF VIRUS
  • 4. Attach themselves to executable files and spread when the file is run. File Infector Virus Target macros in applications like Microsoft Word or Excel. Macro Virus Infects the boot sector of a storage device. Boot Sector Virus TYPES OF VIRUSES
  • 5. Encrypts user data and demands payment for its release. Ransomware Self-replicating programs that spread across networks without user action. Worms Disguise themselves as legitimate programs but perform malicious activities. Trojan Horse TYPES OF VIRUSES
  • 6. Signs of Virus Infection • Slow computer performance. • Frequent crashes or error messages. • Unusual pop-ups or advertisements. • Unauthorized data access or deletion.
  • 7. METHODS OF SPREAD Email Attachments: Fake messages containing malicious files. Removable Media: USB drives and external hard drives. Infected Downloads: Software or media from untrusted sources.
  • 9. Individual-Level Security • Install and update antivirus software. • Regularly update operating systems and software. • Avoid clicking unknown links or downloading from untrusted sources
  • 10. Organization-Level Security • Use firewalls to monitor network traffic. • Train employees about phishing and cyber threats. • Regular data backups and disaster recovery plans.
  • 11. Advanced Security Solutions • Two-Factor Authentication (2FA). • Virtual Private Network (VPN). • Encryption for sensitive data. • Security training for employees.
  • 13. A.I IN DETECTING VIRUS Machine Learning: Flags abnormal system behavior Anomaly Detection: Spot new, unknown viruses Real-Time Monitoring: Scans for threats continuously
  • 14. A.I IN PREVENTING VIRUS Automated Response: AI blocks or isolates threats Predictive Analysis: Forecasts virus outbreaks Adaptive Security: Adjusts to new virus types
  • 15. CASE STUDY WannaCry Ransomware Attack • It occurred in 2017, affecting over 200,000 systems globally. • Exploited a vulnerability in Microsoft Windows. • Demanded payment in Bitcoin for file decryption.
  • 16. CONCLUSION • Stay informed about threats. • Regularly update and protect systems. • Adopt safe online practices. “ An ounce of prevention is worth a pound of cure."