SlideShare a Scribd company logo
Computer Viruses & Management Strategies

Dasun Hegoda
Software Engineer
What we are going to talk
●

What's Malware

●

Spyware, Adware, Backdoor

●

What's A Computer Virus

●

Why Computer Malware(Virus)

●

How Viruses Are Created

●

How Viruses Are Spread

●

Types Of Malware

●

Types Of Viruses
What we are going to talk
●

How To Detect A Malware(Virus)

●

How To Protect Yourself

●

Top Anti-Virus Programs

●

BuzzWords

●

Bottom Line
Malware Definitions
Malware Definitions
●

●

●

Malware, short for malicious software, is software used to
disrupt computer operation, gather sensitive information,
or gain access to private computer systems.
It can appear in the form of code, scripts, active content,
and other software.
Malware includes computer viruses, ransomware, worms,
trojan horses, rootkits, keyloggers, dialers, spyware,
adware, malicious BHOs, rogue security software and
other malicious programs.
Spyware, Adware, Backdoor
Spyware
●

●

●

●

Spyware is malicious computer program that does exactly what
its name implies Eg:, spies on you.
After downloading itself onto your computer either through an
email you opened, website you visited or a program you
downloaded, spyware scans your hard drive for personal
information and your internet browsing habits.
Some spyware programs contain keyloggers that will record
personal data you enter in to websites, such as your login
usernames and passwords, email addresses, browsing history as
well as sensitive banking and credit information.
Some spyware can interfere with your computer's system
settings, which can result in a slower internet connection.
Adware
●

●

●

Adware is any software that, once installed on your
computer, tracks your internet browsing habits and
sends you popups containing advertisements related to
the sites and topics you've visited.
While this type of software may sound innocent, and
even helpful, it consumes and slows down your
computer's processor and internet connection speed.
Additionally, some adware has keyloggers and spyware
built into the program, leading to greater damage to
your computer and possible invasion of your private
data.
Backdoor
●

●

●

●

A backdoor is a method of bypassing normal
authentication procedures.
Once a system has been compromised one or more
backdoors maybe installed in order to allow easier access
in the future.
Backdoors may also be installed prior to malicious
software, to allow attackers entry.
Crackers typically use backdoors to secure remote access
to a computer, while attempting to remain hidden from
casual inspection.
Computer Virus Definitions
What's A Computer Virus
●

●

A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs, data
files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to
be "infected".
Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space or CPU
time, accessing private information, corrupting data,
displaying political or humorous messages on the user's
screen, spamming their contacts, or logging their
keystrokes.
What's A Computer Virus
●

●

●

The defining characteristic of viruses is that they are
self-replicating computer programs which install
themselves without the user's consent.
Virus writers use social engineering and exploit detailed
knowledge of security vulnerabilities to gain access to
their hosts' computing resources.
The vast majority of viruses (over 99%) target systems
running Microsoft Windows, employing a variety of
mechanisms to infect new hosts, and often using
complex anti-detection/stealth strategies to evade
antivirus software.
World 1st Computer Virus
●

●

The first ever computer virus was developed in 1986 by
two Pakistani brothers in Lahore Pakistan.
It was named “Brain” and was designed by Amjad
Farooq Alvi and Basit Farooq Alvi with the intention of
discouraging the piracy of a software written by them.
Why Computer Malware(Virus)
Why Computer Malware(Virus)
●

Seeking profit

●

Desire to send a political message

●

Personal amusement

●

To demonstrate that a vulnerability exists in software

●

For sabotage and denial of service

●

To explore evolutionary algorithms

●

Cause systems failures.

●

Steal information.

●

To prove a point, to prove it can be done, to prove ones
skill or for revenge purposes.
How Viruses Are Created
How Viruses Are Created
●

●

●

●

The first step is that someone will create the virus.
The 2nd step is to pick out the program that the person
wants to attach to.
The 3rd step is attaching the virus to the program.
The 4th step is to try to lure or advertise the program,
so someone will download it in to your computer.

●

The 5th step is to have the virus get in to the computer.

●

The 6th step is to infect the computer.

●

The 7th step is to destroy all of the files on the
computer & more.
How Viruses Are Spread
How Viruses Are Spread
●

Email attachments

●

●

Rogue Websites

●

●

Networks

Instant Messaging
Fake Anti Virus
Software

Infected Boot Disks

●

From Mobile Devices

●

Phishing Schemes

●

Friends and Relatives

●

Infected Software

●

Hackers

●
Types Of Malware
Types Of Malware
●

●

Trojan horses : A Trojan horse is simply a computer
program. The program claims to do one thing (it may
claim to be a game) but instead does damage when
you run it (it may erase your hard disk). Trojan horses
have no way to replicate automatically.
Worms : A worm is a small piece of software that uses
computer networks and security holes to replicate itself.
A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself
to the new machine using the security hole, and then
starts replicating from there, as well.
Types Of Malware

●

Viruses : A virus is a small piece of software that
piggybacks on real programs. For example, a virus
might attach itself to a program such as a spreadsheet
program. Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to reproduce (by
attaching to other programs).
Types Of Malware

●

E-mail viruses : An e-mail virus travels as an
attachment to e- mail messages, and usually replicates
itself by automatically mailing itself to dozens of people
in the victim's e-mail address book. Some e-mail
viruses don't even require a double-click -- they launch
when you view the infected message in the preview
pane of your e-mail software
Types Of Viruses
Types Of Viruses
●

Boot Sector Virus

●

Browser Hijacker

●

Direct Action Virus

●

File Infector Virus

●

Macro Virus

●

Multipartite Virus

●

Polymorphic Virus

●

Resident Virus

●

Web Scripting Virus
How To Detect A Virus
How To Detect A Malware(Virus)?
●

Programs takes longer to load.

●

The programs sizes keep changing.

●

The drive light keeps flashing when you are not doing
anything(Loading).

●

User created files have strange names.

●

The computer doesn't remember CMOS settings.

●

System crashes for no reason.

●

Screen sometimes flicker.

●

Files/directories sometimes disappear.
How To Detect A Malware(Virus)?
●

It might change the power ratings of your computer and
could blast the system.

●

You cannot print items correctly.

●

Disks or disk drives are inaccessible.

●

Applications on the computer do not work correctly.

●

Strange sounds or music plays from the speakers
unexpectedly.

●

Computer restarts every few minutes automatically.

●

…........
How To Protect Yourself
How To Protect Yourself
●

Use Antivirus Programs

●

Use Firewalls

●

Make Passwords Encrypted

●

Scan your PC Daily

●

Switch off net when not using

●

Don’t download software from unknown source

●

Disable Auto run

●

Read reviews before installing software
How To Protect Yourself
●

Download anti-spyware program

●

Don’t open e-mail that you are not sure

●

Keep backups

●

Keep OS up to date

●

Scan removable storages
Top Anti-Virus Programs
Top Anti-Virus Programs
●

Bitdefender Antivirus

●

Kaspersky Anti-Virus

●

Norton AntiVirus

●

F-Secure Anti-Virus

●

AVG Anti-Virus

●

Avast! Pro Antivirus

●

McAfee AntiVirus

●

Panda Antivirus Pro
Buzzwords
FireWalls
●

●

A firewall is a software or hardware-based network
security system that controls the incoming and
outgoing network traffic by analyzing the data packets
and determining whether they should be allowed
through or not, based on applied rule set.
Firewalls can be defined in many ways according to
your level of understanding. A firewall establishes a
barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is not assumed
to be secure and trusted.
FireWalls
Antivirus software
●

●

●

Antivirus, anti-virus, or AV software is computer software used
to prevent, detect and remove malicious computer viruses.
Most software described as antivirus also works against other
types of malware, such as malicious Browser Helper Objects
(BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs,
dialers, fraudtools, adware and spyware.
Computer security, including protection from social
engineering techniques, is commonly offered in products and
services of antivirus software companies.
Boot sector
●

●

A boot sector or boot block is a region of a hard disk,
floppy disk, optical disc, or other data storage device
that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in
firmware.
The purpose of a boot sector is to allow the boot
process of a computer to load a program (usually, but
not necessarily, an operating system) stored on the
same storage device.
Encryption
●

●

●

Encryption is the process of encoding messages (or
information) in such a way that third parties cannot read
it, but only authorized parties can.
Encryption doesn't prevent hacking but it prevents the
hacker from reading the data that is encrypted.
The message or information (referred to as plaintext) is
encrypted using an encryption algorithm, turning it into
an unreadable ciphertext.
That's It!!!
Bottom Line
●

●

Computer viruses currently cause billions of dollars
worth of economic damage each year, due to causing
systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc.
In response, free, open-source anti-virus tools have
been developed, and a multi-billion dollar industry of
anti-virus software vendors has cropped up, selling
virus protection to Windows users. Unfortunately, no
currently existing anti-virus software is able to catch all
computer viruses.
References
●

www.makeuseof.com/tag/types-computer-viruses-watch/

More Related Content

PPTX
Computer virus
PPTX
Electronic mail
PPT
All about email
PPTX
Computers as Aids to Teaching
PPTX
SCOPE OF ICT IN TEACHING AND LEARNING PROCESS, PUBLICATION
PPT
Introduction to Information Technology Lecture Slides PPT
PPTX
The Use Of Emails And Blogs In Education
PPTX
Concept need and importance of internet in Education.pptx
Computer virus
Electronic mail
All about email
Computers as Aids to Teaching
SCOPE OF ICT IN TEACHING AND LEARNING PROCESS, PUBLICATION
Introduction to Information Technology Lecture Slides PPT
The Use Of Emails And Blogs In Education
Concept need and importance of internet in Education.pptx

What's hot (20)

PPTX
Computer Viruses
PPTX
Health education
PPTX
Introduction to SWAYAM MOOCs
PPTX
Computer assisted instruction
PPTX
Internet and Its Applications
PPTX
Online Learning: Meaning, Scope and Its Importance in Teaching and Learning P...
PPTX
E-LEARNING
PPTX
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
PPT
Virtual learning environment(vle)
PPTX
3.b.ed class-scope of ict
PPTX
Concept need and importance of internet in Education.pptx
PPT
Grading and Record keeping software
PPTX
Chat Technology
PPTX
Elearning.ppt
PPTX
E content
PPTX
Problems of children with special needs
PPTX
Grading in Education
PPTX
Role of MHRD, UGC, NCTE and AICTE in Higher Education
Computer Viruses
Health education
Introduction to SWAYAM MOOCs
Computer assisted instruction
Internet and Its Applications
Online Learning: Meaning, Scope and Its Importance in Teaching and Learning P...
E-LEARNING
COMPUTERS IN EDUCATION - UNIT 8 - ROLE OF COMPUTER IN EDUCATION - B.ED - 8620...
Virtual learning environment(vle)
3.b.ed class-scope of ict
Concept need and importance of internet in Education.pptx
Grading and Record keeping software
Chat Technology
Elearning.ppt
E content
Problems of children with special needs
Grading in Education
Role of MHRD, UGC, NCTE and AICTE in Higher Education
Ad

Viewers also liked (20)

PPTX
Avalon 2016 Overview
DOCX
風船と少年とイソギンチャク、空に昇る。
PPTX
Presentasi kk 2
PPTX
Sales Strategy
PDF
lpSolve - R Library
DOCX
Mencari cahaya ilahi
PPTX
Avalon 5.0 and Beyond
PDF
Mac OSx command line (terminal)
PPTX
American fantasy drama
PDF
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
PPTX
The Avalon Media System: Implementation and Community
PDF
X science 1st grading module
PPTX
EL FENÓMENO YOUTUBER
PDF
Avalon Media System Community Update Webinar
DOC
Nota%20exam%20hadith[1]
PPTX
The Displacement Statistic
PPT
Oracle world (1)
PDF
C and objective-C
POT
презентация для франчайзи
Avalon 2016 Overview
風船と少年とイソギンチャク、空に昇る。
Presentasi kk 2
Sales Strategy
lpSolve - R Library
Mencari cahaya ilahi
Avalon 5.0 and Beyond
Mac OSx command line (terminal)
American fantasy drama
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: Implementation and Community
X science 1st grading module
EL FENÓMENO YOUTUBER
Avalon Media System Community Update Webinar
Nota%20exam%20hadith[1]
The Displacement Statistic
Oracle world (1)
C and objective-C
презентация для франчайзи
Ad

Similar to Computer Viruses & Management Strategies (20)

PPTX
Compter virus and its solution
ODP
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
ODP
Virus and antivirus final ppt
ODP
Viruses andthreats@dharmesh
PPT
COMPUTER VIRUS affecting to computer software
DOCX
COMPUTERS ( types of viruses)
PPTX
Computer virus
PPT
Computer virus 18
PDF
virus-part2-150726093824-lva1-app6891.pdf
PPTX
Computer Malware and its types
PPTX
Computer viruses
PPTX
Computer Virus
PPT
Virus part2
PPTX
Virus and malware presentation
PDF
Computer virus
PPT
list of Deception as well as detection techniques for maleware
PPTX
Computer virus
PPTX
ANATOMY OF A COMPUTER VIRUS.pptx
Compter virus and its solution
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virus and antivirus final ppt
Viruses andthreats@dharmesh
COMPUTER VIRUS affecting to computer software
COMPUTERS ( types of viruses)
Computer virus
Computer virus 18
virus-part2-150726093824-lva1-app6891.pdf
Computer Malware and its types
Computer viruses
Computer Virus
Virus part2
Virus and malware presentation
Computer virus
list of Deception as well as detection techniques for maleware
Computer virus
ANATOMY OF A COMPUTER VIRUS.pptx

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)

Computer Viruses & Management Strategies

  • 1. Computer Viruses & Management Strategies Dasun Hegoda Software Engineer
  • 2. What we are going to talk ● What's Malware ● Spyware, Adware, Backdoor ● What's A Computer Virus ● Why Computer Malware(Virus) ● How Viruses Are Created ● How Viruses Are Spread ● Types Of Malware ● Types Of Viruses
  • 3. What we are going to talk ● How To Detect A Malware(Virus) ● How To Protect Yourself ● Top Anti-Virus Programs ● BuzzWords ● Bottom Line
  • 5. Malware Definitions ● ● ● Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  • 7. Spyware ● ● ● ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information. Some spyware can interfere with your computer's system settings, which can result in a slower internet connection.
  • 8. Adware ● ● ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  • 9. Backdoor ● ● ● ● A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 11. What's A Computer Virus ● ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 12. What's A Computer Virus ● ● ● The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  • 13. World 1st Computer Virus ● ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  • 15. Why Computer Malware(Virus) ● Seeking profit ● Desire to send a political message ● Personal amusement ● To demonstrate that a vulnerability exists in software ● For sabotage and denial of service ● To explore evolutionary algorithms ● Cause systems failures. ● Steal information. ● To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
  • 16. How Viruses Are Created
  • 17. How Viruses Are Created ● ● ● ● The first step is that someone will create the virus. The 2nd step is to pick out the program that the person wants to attach to. The 3rd step is attaching the virus to the program. The 4th step is to try to lure or advertise the program, so someone will download it in to your computer. ● The 5th step is to have the virus get in to the computer. ● The 6th step is to infect the computer. ● The 7th step is to destroy all of the files on the computer & more.
  • 18. How Viruses Are Spread
  • 19. How Viruses Are Spread ● Email attachments ● ● Rogue Websites ● ● Networks Instant Messaging Fake Anti Virus Software Infected Boot Disks ● From Mobile Devices ● Phishing Schemes ● Friends and Relatives ● Infected Software ● Hackers ●
  • 21. Types Of Malware ● ● Trojan horses : A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms : A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 22. Types Of Malware ● Viruses : A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
  • 23. Types Of Malware ● E-mail viruses : An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  • 25. Types Of Viruses ● Boot Sector Virus ● Browser Hijacker ● Direct Action Virus ● File Infector Virus ● Macro Virus ● Multipartite Virus ● Polymorphic Virus ● Resident Virus ● Web Scripting Virus
  • 26. How To Detect A Virus
  • 27. How To Detect A Malware(Virus)? ● Programs takes longer to load. ● The programs sizes keep changing. ● The drive light keeps flashing when you are not doing anything(Loading). ● User created files have strange names. ● The computer doesn't remember CMOS settings. ● System crashes for no reason. ● Screen sometimes flicker. ● Files/directories sometimes disappear.
  • 28. How To Detect A Malware(Virus)? ● It might change the power ratings of your computer and could blast the system. ● You cannot print items correctly. ● Disks or disk drives are inaccessible. ● Applications on the computer do not work correctly. ● Strange sounds or music plays from the speakers unexpectedly. ● Computer restarts every few minutes automatically. ● …........
  • 29. How To Protect Yourself
  • 30. How To Protect Yourself ● Use Antivirus Programs ● Use Firewalls ● Make Passwords Encrypted ● Scan your PC Daily ● Switch off net when not using ● Don’t download software from unknown source ● Disable Auto run ● Read reviews before installing software
  • 31. How To Protect Yourself ● Download anti-spyware program ● Don’t open e-mail that you are not sure ● Keep backups ● Keep OS up to date ● Scan removable storages
  • 33. Top Anti-Virus Programs ● Bitdefender Antivirus ● Kaspersky Anti-Virus ● Norton AntiVirus ● F-Secure Anti-Virus ● AVG Anti-Virus ● Avast! Pro Antivirus ● McAfee AntiVirus ● Panda Antivirus Pro
  • 35. FireWalls ● ● A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
  • 37. Antivirus software ● ● ● Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
  • 38. Boot sector ● ● A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program (usually, but not necessarily, an operating system) stored on the same storage device.
  • 39. Encryption ● ● ● Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. The message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
  • 41. Bottom Line ● ● Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source anti-virus tools have been developed, and a multi-billion dollar industry of anti-virus software vendors has cropped up, selling virus protection to Windows users. Unfortunately, no currently existing anti-virus software is able to catch all computer viruses.