B.ed First Year Session 2020-22
EPC 3-Criticial understanding of ICT
Name: Km.Madhu Devi
Roll Number#2059
Computer Virus and its
management
Overview
What is computer Virus & its
historical prospective?
What are its various types?
How does it impact us?
How can we manage it?
A computer virus is a type of computer
program that, when executed,
replicates itself by modifying other
computer programs and inserting its
own code. If this replication succeeds,
the affected areas are then said to be
"infected" with a computer virus.
The first computer virus, called "Creeper system",
was an experimental self-
replicating virus released in 1971. It was filling up
the hard drive until a computer could not operate
any further. This virus was created by BBN
technologies in the US. The first computer
virus for MS-DOS was "Brain" and was released in
1986.
Resident vs. non-resident viruses
Macro viruses
Boot sector viruses
Email virus
A memory-resident virus (or simply "resident virus")
installs itself as part of the operating system when
executed, after which it remains in RAM from the time
the computer is booted up to when it is shut down.
Resident viruses overwrite interrupt handling code or
other functions, and when the operating system
attempts to access the target file or disk sector, the
virus code intercepts the request and redirects
the control flow to the replication module, infecting the
target
A macro virus (or "document virus") is a virus
that is written in a macro language and
embedded into these documents so that
when users open the file, the virus code is
executed, and can infect the user's computer.
This is one of the reasons that it is
dangerous to open unexpected or
suspicious attachments in e-mails
Boot sector viruses specifically target
the boot sector and/or the Master Boot
Record (MBR) of the host's hard disk
drive, solid-state drive, or removable
storage media (flash drives, floppy
disks, etc.).
Email viruses are viruses that intentionally, rather
than accidentally, uses the email system to spread.
While virus infected files may be accidentally sent
as email attachments, email viruses are aware of
email system functions. They generally target a
specific type of email system (Microsoft Outlook is
the most commonly used), harvest email addresses
from various sources, and may append copies of
themselves to all email sent, or may generate email
messages containing copies of themselves as
attachments
Install Anti-Virus/Malware Software.
Keep Your Anti-Virus Software Up to Date
Run Regularly Scheduled Scans with Your Anti-Virus
Software.
Keep Your Operating System Current.
Secure Your Network.
Think Before You Click.
Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Back Up Your Files.
Use Multiple Strong Passwords.
Thanks and Regards
: Km.Madhu Devi
B.Ed First Year
Roll# 2059

More Related Content

PPTX
suraj singh Bed PPT(Computer Virus and its management).pptx
PPTX
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
PPT
Computer viruses
PPT
PPT
Virus, Worms And Antivirus
PPTX
Computer virus
PPT
Computer Virus And Antivirus-Sumon Chakraborty
DOCX
Computer viruses by joy chakraborty
suraj singh Bed PPT(Computer Virus and its management).pptx
vcsdvghg hscvjckc ccygbgcyhbb hdydbtegc jvcj.pptx
Computer viruses
Virus, Worms And Antivirus
Computer virus
Computer Virus And Antivirus-Sumon Chakraborty
Computer viruses by joy chakraborty

Similar to Madhu Devi ppt(computer virus and its management).pptx (20)

PDF
Computer viruses
PPTX
Cybercrime: Virus and Defense
PPTX
Types of Virus & Anti-virus
PPTX
Introduction to Computer Virus
PPTX
Virus-Awareness
ODP
Virus and antivirus final ppt
PPTX
Computer virus
PPT
Computer Viruses and Classification lecture slides ppt
DOCX
What is a computer virus
PDF
computer virus Report
PPTX
Virus soran university
PPTX
Antivirus programs
PPT
Computer virus 18
PPT
Computer Virus
PDF
COMPUTER VIRUSES AND WORMS.pdf
PPTX
Computer Virus
PPTX
Computer Introduction-Lecture04
PPT
Virus and antivirus
PPS
Virus
Computer viruses
Cybercrime: Virus and Defense
Types of Virus & Anti-virus
Introduction to Computer Virus
Virus-Awareness
Virus and antivirus final ppt
Computer virus
Computer Viruses and Classification lecture slides ppt
What is a computer virus
computer virus Report
Virus soran university
Antivirus programs
Computer virus 18
Computer Virus
COMPUTER VIRUSES AND WORMS.pdf
Computer Virus
Computer Introduction-Lecture04
Virus and antivirus
Virus
Ad

More from DEEP TIWARI (20)

PPT
applicationsofbiotechnvcbvbvbvvcbcvbology.ppt
PPTX
hdcytryrt rtyrt yrty ytr rtyrtdn bchjdgjl bhdh.pptx
PPTX
Mrtr ret retrt retrdretre hu Dertretevi ppt(computer virus and its management...
PPTX
fdgfdg dfg dfg gfg g gfdgdf fg bhdh.pptx
PPT
DFD DF applicfgationsofbiofg technology.ppt
PDF
doerew ewre ewrewgfh hj hjhghgwnload.pdf
PDF
LErewewrew ewrewrew ewreet TTER06VIP.pdf
PDF
NASewww4 rtrtrhwwdt rwweHRA ANSARI_CV.pdf
PPTX
PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
PPT
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
PPTX
ewrewr rerwerwer erwerwe werew werwer.pptx
PPT
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
PPTX
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
PPTX
business management project on new topic
PPTX
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
PPTX
deepchandtiwari.pptx
PPTX
Madhu Devi ppt(computer virus and its management).pptx
PDF
REHAN NAWAZ KHAN_CV.pdf
DOCX
PF_Declartion_Form (1).docx
PDF
applicationsofbiotechnvcbvbvbvvcbcvbology.ppt
hdcytryrt rtyrt yrty ytr rtyrtdn bchjdgjl bhdh.pptx
Mrtr ret retrt retrdretre hu Dertretevi ppt(computer virus and its management...
fdgfdg dfg dfg gfg g gfdgdf fg bhdh.pptx
DFD DF applicfgationsofbiofg technology.ppt
doerew ewre ewrewgfh hj hjhghgwnload.pdf
LErewewrew ewrewrew ewreet TTER06VIP.pdf
NASewww4 rtrtrhwwdt rwweHRA ANSARI_CV.pdf
PRODffffffffffffffffffffUCT LIFE CYICLE.pptx
Piaget theory by yashjmmnmn,mjhgaizz (1).ppt
ewrewr rerwerwer erwerwe werew werwer.pptx
PRdfg dgsOdfdg gdfgsf TTPfgf L fdgfg N.PPT
Madhu kumari hgdtu jhfgh juyfdsawe lopkjih.pptx
business management project on new topic
KHANDELWAL COLLEGE OF MANAGEMENT SCIENCE AND TECHNOLOGY.pptx
deepchandtiwari.pptx
Madhu Devi ppt(computer virus and its management).pptx
REHAN NAWAZ KHAN_CV.pdf
PF_Declartion_Form (1).docx
Ad

Recently uploaded (20)

PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
Current and future trends in Computer Vision.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Software Engineering and software moduleing
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
introduction to high performance computing
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Current and future trends in Computer Vision.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
III.4.1.2_The_Space_Environment.p pdffdf
Visual Aids for Exploratory Data Analysis.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Fundamentals of Mechanical Engineering.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Software Engineering and software moduleing
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems

Madhu Devi ppt(computer virus and its management).pptx

  • 1. B.ed First Year Session 2020-22 EPC 3-Criticial understanding of ICT Name: Km.Madhu Devi Roll Number#2059
  • 2. Computer Virus and its management
  • 3. Overview What is computer Virus & its historical prospective? What are its various types? How does it impact us? How can we manage it?
  • 4. A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
  • 5. The first computer virus, called "Creeper system", was an experimental self- replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.
  • 6. Resident vs. non-resident viruses Macro viruses Boot sector viruses Email virus
  • 7. A memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down. Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target
  • 8. A macro virus (or "document virus") is a virus that is written in a macro language and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer. This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails
  • 9. Boot sector viruses specifically target the boot sector and/or the Master Boot Record (MBR) of the host's hard disk drive, solid-state drive, or removable storage media (flash drives, floppy disks, etc.).
  • 10. Email viruses are viruses that intentionally, rather than accidentally, uses the email system to spread. While virus infected files may be accidentally sent as email attachments, email viruses are aware of email system functions. They generally target a specific type of email system (Microsoft Outlook is the most commonly used), harvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments
  • 11. Install Anti-Virus/Malware Software. Keep Your Anti-Virus Software Up to Date Run Regularly Scheduled Scans with Your Anti-Virus Software. Keep Your Operating System Current. Secure Your Network. Think Before You Click. Keep Your Personal Information Safe.  Don’t Use Open Wi-Fi.  Back Up Your Files. Use Multiple Strong Passwords.
  • 12. Thanks and Regards : Km.Madhu Devi B.Ed First Year Roll# 2059