SlideShare a Scribd company logo
1
2
Introduction
What is Computer Virus
Types of Infection
Types of Computer Virus
Difference between Virus and Worm
Signs of a Computer Virus
Preventions
Top Seven Antiviral Program
Conclusion 3
A virus is a program designed by a
computer programmer (malicious
hacker) to do a certain unwanted
function
4
 Computer virus refers to a program which damages computer systems and/or
destroys or erases data files
5
A virus is a small piece of
Software that piggybacks
on real programs.
Two main characteristics
of viruses
 It must execute itself
 It must replicate itself
6
 Moves around in e-mail messages
 It replicate itself by automatically mailing itself to dozens of people
in the victim’s email address book
 Example “MELISSA VIRUS”
 Example “I LOVE YOU VIRUS”
7
Melissa virus spread in Microsoft Word documents sent via e-mail
How it works ?
 Created the virus as word document
 Uploaded to an internet newsgroup
 Anyone who download the document and opened it would trigger the virus
 Send friendly email messages to first 50 people in person’s address book
8
 Melissa Virus was the fastest spreading virus ever seen
 Forced a number of large companies to shut down their e-mail systems
9
 Contained a piece of code as an attachment.
 Double Click on the attachment triggered the code
 Sent copies of itself to everyone in the victim’s address book
 Started corrupting files on the victim’s machine
10
 Small piece of software that uses
computer networks and security holes to
replicate itself
 Copy of the worm scans the network for
another machine that has a specific
security hole
 Copy itself to the new machine using the
security hole and start replicating
 Example “CODE RED”
11
 A simple computer program
 It claim to be a game
 Erase your hard disk
 No way to replicate itself
12
 Time Bomb
A time bomb is a virus program that performs an activity on a particular date
 Logical Bomb
A logical bomb is a destructive program that performs an activity when a certain
action has occurred
13
 Boot Sector Virus
A boot sector virus infects boot sector of computers. During system boot, boot
sector virus is loaded into main memory and destroys data stored in hard disk
14
 Macros Virus
A macro virus is associated with application software like word and excel. When
opening the infected document, macro virus is loaded into main memory and
destroys the data stored in hard disk
15
 The difference between a worm and a virus is that a virus does not have a
propagation vector. i.e. it will only effect one host and does not propagate to other
hosts
 Worms propagate and infect other computers. Majority of threats are actually
worms that propagate to other hosts
16
 Computer viruses cause a huge amount of damage worldwide
 Damages from just one virus (The I Love You Virus) are estimated at $10 billion
dollars.
 It is also estimated that 45 million people worldwide were affected
17
 Computer runs slower then usual
 Computer no longer boots up
 Screen sometimes flicker
 PC speaker beeps periodically
 System crashes for no reason
 Files/directories sometimes disappear
 Denial of Service (DoS)
18
 Anti-Viruses
 Updates
 More secure operating systems
e.g. UNIX
19
 Bitdefender Antivirus
 Norton AntiVirus.
 Kaspersky Anti-Virus
 Trend Micro Antivirus
 Webroot Secure
 Avast antivirus
 Sophos Home
20
 Be aware of the new infections out there.
 Take precaution measures.
 Always backup your data.
 Keep up-to-date on new Anti virus software.
 Simply avoid programs from unknown sources.
21
 www.google.com
 www.wikipedia.com
 www.studymafia.org
22

More Related Content

PPTX
CSE computer virus.pptx. Computer virus.
PPTX
Computer virus
PPT
VIRUSES AND ANTI-VIRUSES
PPT
Computer Viruses and Classification lecture slides ppt
PPS
Virus
PPTX
Computer viruses
CSE computer virus.pptx. Computer virus.
Computer virus
VIRUSES AND ANTI-VIRUSES
Computer Viruses and Classification lecture slides ppt
Virus
Computer viruses

Similar to Computer Virus.pptx (20)

PPT
Virus worm trojan
PPTX
Computer virus
PPTX
Computer virus
PPS
Virus worm trojan
DOCX
What is a computer virus
PDF
COMPUTER VIRUSES AND WORMS.pdf
PPTX
Computer virus
PPTX
PPT on information technology laws description
PPTX
Virus and antivirus
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
Cybercrime: Virus and Defense
PPT
Computer Viruses
PPT
Comp. Viruses
PPT
Virus, Worms And Antivirus
PDF
Computer viruses. - Free Online Library
PPTX
COMPUTER VIRUS.pptx
PPTX
Computer virus
PPTX
Presentation on virus
PDF
Antivirus security
PPT
Viruses.ppt
Virus worm trojan
Computer virus
Computer virus
Virus worm trojan
What is a computer virus
COMPUTER VIRUSES AND WORMS.pdf
Computer virus
PPT on information technology laws description
Virus and antivirus
Computer Virus And Antivirus-Sumon Chakraborty
Cybercrime: Virus and Defense
Computer Viruses
Comp. Viruses
Virus, Worms And Antivirus
Computer viruses. - Free Online Library
COMPUTER VIRUS.pptx
Computer virus
Presentation on virus
Antivirus security
Viruses.ppt
Ad

Recently uploaded (20)

PPTX
Patient Appointment Booking in Odoo with online payment
PDF
STL Containers in C++ : Sequence Container : Vector
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Types of Token_ From Utility to Security.pdf
PPTX
Trending Python Topics for Data Visualization in 2025
Patient Appointment Booking in Odoo with online payment
STL Containers in C++ : Sequence Container : Vector
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Autodesk AutoCAD Crack Free Download 2025
Weekly report ppt - harsh dattuprasad patel.pptx
Oracle Fusion HCM Cloud Demo for Beginners
Digital Systems & Binary Numbers (comprehensive )
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Monitoring Stack: Grafana, Loki & Promtail
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
DNT Brochure 2025 – ISV Solutions @ D365
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Computer Software and OS of computer science of grade 11.pptx
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Types of Token_ From Utility to Security.pdf
Trending Python Topics for Data Visualization in 2025
Ad

Computer Virus.pptx

  • 1. 1
  • 2. 2
  • 3. Introduction What is Computer Virus Types of Infection Types of Computer Virus Difference between Virus and Worm Signs of a Computer Virus Preventions Top Seven Antiviral Program Conclusion 3
  • 4. A virus is a program designed by a computer programmer (malicious hacker) to do a certain unwanted function 4
  • 5.  Computer virus refers to a program which damages computer systems and/or destroys or erases data files 5
  • 6. A virus is a small piece of Software that piggybacks on real programs. Two main characteristics of viruses  It must execute itself  It must replicate itself 6
  • 7.  Moves around in e-mail messages  It replicate itself by automatically mailing itself to dozens of people in the victim’s email address book  Example “MELISSA VIRUS”  Example “I LOVE YOU VIRUS” 7
  • 8. Melissa virus spread in Microsoft Word documents sent via e-mail How it works ?  Created the virus as word document  Uploaded to an internet newsgroup  Anyone who download the document and opened it would trigger the virus  Send friendly email messages to first 50 people in person’s address book 8
  • 9.  Melissa Virus was the fastest spreading virus ever seen  Forced a number of large companies to shut down their e-mail systems 9
  • 10.  Contained a piece of code as an attachment.  Double Click on the attachment triggered the code  Sent copies of itself to everyone in the victim’s address book  Started corrupting files on the victim’s machine 10
  • 11.  Small piece of software that uses computer networks and security holes to replicate itself  Copy of the worm scans the network for another machine that has a specific security hole  Copy itself to the new machine using the security hole and start replicating  Example “CODE RED” 11
  • 12.  A simple computer program  It claim to be a game  Erase your hard disk  No way to replicate itself 12
  • 13.  Time Bomb A time bomb is a virus program that performs an activity on a particular date  Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred 13
  • 14.  Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk 14
  • 15.  Macros Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk 15
  • 16.  The difference between a worm and a virus is that a virus does not have a propagation vector. i.e. it will only effect one host and does not propagate to other hosts  Worms propagate and infect other computers. Majority of threats are actually worms that propagate to other hosts 16
  • 17.  Computer viruses cause a huge amount of damage worldwide  Damages from just one virus (The I Love You Virus) are estimated at $10 billion dollars.  It is also estimated that 45 million people worldwide were affected 17
  • 18.  Computer runs slower then usual  Computer no longer boots up  Screen sometimes flicker  PC speaker beeps periodically  System crashes for no reason  Files/directories sometimes disappear  Denial of Service (DoS) 18
  • 19.  Anti-Viruses  Updates  More secure operating systems e.g. UNIX 19
  • 20.  Bitdefender Antivirus  Norton AntiVirus.  Kaspersky Anti-Virus  Trend Micro Antivirus  Webroot Secure  Avast antivirus  Sophos Home 20
  • 21.  Be aware of the new infections out there.  Take precaution measures.  Always backup your data.  Keep up-to-date on new Anti virus software.  Simply avoid programs from unknown sources. 21