SlideShare a Scribd company logo
presentation on computer virus
CONTENTS
INTRODUCTION.
Similarities B/w Biological & Computer Virus.
How Does A Virus Work?
Life Cycle Of Computer Virus.
Functional Diagram of VIRUS.
Types Of VIRUS.
Methods Of Detecting Virus By ANTI-VIRUS.
Prevention.
COMPUTER VIRUS:
A computer virus is a program or piece of code that is loaded onto your
computer without your knowledge and run against your wish.
OR
A virus is illegal computer code that can do such things as alter programs or
destroy data. Also, the virus can copy itself onto programs, thereby spreading
its damaging effects.
Similarities between biological virus
and computer virus:
Computer virus are called viruses because they share some of the traits of biological
Viruses. A computer virus passed from computer to computer like a biological virus
Passes from person to person
• Need a host for residence.
• Capable of self-replicate.
• Cause damage to host.
How Does A VIRUS Spread?
 first the virus is linked to the host object in such a
way that it activates when the host
object is used.
 Second virus looks for other suitable carrier
objects and attaches itself to them.
 With this dependency virus slows down the system.
How does a virus work?
The virus waits until user transmits the
infected object to another computer
User transmits an infected object to another
computer
The virus locates and infects suitable objects
on the new computer
VIRUS
ANTI-
DETECTIN
ROUTINES
COPY
SEARCH
TYPES OF VIRUS
MACRO VIRUS.
BOOT SECTOR VIRUS.
WORMS.
TROJEN HORSES.
LOGIC BOMBS.
MACRO VIRUS:
A macro virus is associated with
application software like word and
excel. When opening the infected
document, macro virus is loaded into
main memory and destroys the data
stored in hard disk.
BOOT SECTOR VIRUS
A boot sector virus infects boot
sector of computers. During system
boot, boot sector virus is loaded
into main memory and destroys
data stored in hard disk
WORMS
A worm is also a destructive program
that fills a computer system with self-
replicating information.
Types of WORMS VIRUS:
MAIL WORM
PURE WORM
TROJAN HORSE
Trojan Horse is a destructive
program. It usually pretends as
computer games or application
software. If executed, computer
system will be damaged.
LOGICAL BOMBS
A logical bomb is a destructive
program that performs an activity
when a certain action has occurred.
OTHERS
Time Bomb
Script Virus
Directory Virus
Signature-Based Detection-Compare the
contents of a file to a dictionary of virus.
Behavior -Based Detection:
Observe how the program execute in the computer
Rather than looking for signature .
Check the suspicious file and show warnings to the
user.
Heuristic -Based Detection:
 Detect and remove all threats.
 Create a generic signature.
PREVENTION
 Don't share Drive C: without a password and
without read-only restrictions.
 Use Anti-Virus.
 Delete e-mail file attachments.
 Have multiple backups of important files.
 More secure operating systems
e.g. UNIX
ANY
QUESTION
THANK YOU

More Related Content

PPT
Computer viruses
PPTX
Computer viruses
PPTX
Welcome to my presentation
PPTX
Computer virus
ODP
Virus and antivirus final ppt
PPTX
Computer virus and antivirus
PPTX
Presentation on Computer Viruses
PPTX
What is a virus and anti virus
Computer viruses
Computer viruses
Welcome to my presentation
Computer virus
Virus and antivirus final ppt
Computer virus and antivirus
Presentation on Computer Viruses
What is a virus and anti virus

What's hot (20)

PPTX
Computer virus
PPTX
Computer Virus
PPTX
Computer Viruses
PPTX
Computer virus 1
PPT
Ppt on different types of computer viruses
PPTX
Computer virus
PPTX
Computer virus
PPTX
Virus class 7
PPTX
Antivirus
PPTX
Computer virus
PPTX
PPT
Computer viruses and antiviruses PPT
PPTX
Computer virus (Microsoft Powerpoint)
PDF
How To Protect From Malware
PPTX
virus and antivirus
PDF
Computer viruses
PPTX
Antivirus
PPTX
Virus vs anti virus
PPTX
Computer Virus powerpoint presentation
Computer virus
Computer Virus
Computer Viruses
Computer virus 1
Ppt on different types of computer viruses
Computer virus
Computer virus
Virus class 7
Antivirus
Computer virus
Computer viruses and antiviruses PPT
Computer virus (Microsoft Powerpoint)
How To Protect From Malware
virus and antivirus
Computer viruses
Antivirus
Virus vs anti virus
Computer Virus powerpoint presentation
Ad

Viewers also liked (12)

ODT
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PPT
Internal components of the computer
PPTX
Computer Generation Presentation
PPTX
GENERATIONS OF COMPUTER
PPTX
Computer Systems - Input, Process, Output
PDF
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
PPTX
Computer forensics ppt
PPTX
Components of a computer system
PPT
Basic concepts of computer Networking
PPT
Computer presentation
PPT
Basic concept of management
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
Internal components of the computer
Computer Generation Presentation
GENERATIONS OF COMPUTER
Computer Systems - Input, Process, Output
DepEd TLE Computer Hardware Servicing Curriculum Guide Grade 7-10
Computer forensics ppt
Components of a computer system
Basic concepts of computer Networking
Computer presentation
Basic concept of management
BASIC CONCEPTS OF COMPUTER NETWORKS
Ad

Similar to presentation on computer virus (20)

PPTX
viruses and its types in the computer system
PDF
Virus bashdar
PPTX
Computer viruses
PPTX
How computer works against thevirus or any threat
PPT
Computer virus 18
PPT
PPT
PPTX
Virus-Awareness
PPT
PPT
Virus, Worms And Antivirus
PPTX
PPT on information technology laws description
PPTX
Cybercrime: Virus and Defense
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PPTX
CSE computer virus.pptx. Computer virus.
PPT
Computer Viruses and Classification lecture slides ppt
PPS
Virus
PPT
Computer viruses
PPTX
Computer virus
PPTX
PPTX
Computer vrise
viruses and its types in the computer system
Virus bashdar
Computer viruses
How computer works against thevirus or any threat
Computer virus 18
Virus-Awareness
Virus, Worms And Antivirus
PPT on information technology laws description
Cybercrime: Virus and Defense
Computer Virus And Antivirus-Sumon Chakraborty
CSE computer virus.pptx. Computer virus.
Computer Viruses and Classification lecture slides ppt
Virus
Computer viruses
Computer virus
Computer vrise

Recently uploaded (20)

PPTX
introduction to high performance computing
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Soil Improvement Techniques Note - Rabbi
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
Occupational Health and Safety Management System
PPTX
communication and presentation skills 01
PPTX
Current and future trends in Computer Vision.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
introduction to high performance computing
Visual Aids for Exploratory Data Analysis.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
Fundamentals of Mechanical Engineering.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Soil Improvement Techniques Note - Rabbi
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Occupational Health and Safety Management System
communication and presentation skills 01
Current and future trends in Computer Vision.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Abrasive, erosive and cavitation wear.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...

presentation on computer virus

  • 2. CONTENTS INTRODUCTION. Similarities B/w Biological & Computer Virus. How Does A Virus Work? Life Cycle Of Computer Virus. Functional Diagram of VIRUS. Types Of VIRUS. Methods Of Detecting Virus By ANTI-VIRUS. Prevention.
  • 3. COMPUTER VIRUS: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and run against your wish. OR A virus is illegal computer code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
  • 4. Similarities between biological virus and computer virus: Computer virus are called viruses because they share some of the traits of biological Viruses. A computer virus passed from computer to computer like a biological virus Passes from person to person • Need a host for residence. • Capable of self-replicate. • Cause damage to host.
  • 5. How Does A VIRUS Spread?  first the virus is linked to the host object in such a way that it activates when the host object is used.  Second virus looks for other suitable carrier objects and attaches itself to them.  With this dependency virus slows down the system. How does a virus work?
  • 6. The virus waits until user transmits the infected object to another computer User transmits an infected object to another computer The virus locates and infects suitable objects on the new computer
  • 8. TYPES OF VIRUS MACRO VIRUS. BOOT SECTOR VIRUS. WORMS. TROJEN HORSES. LOGIC BOMBS.
  • 9. MACRO VIRUS: A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk.
  • 10. BOOT SECTOR VIRUS A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
  • 11. WORMS A worm is also a destructive program that fills a computer system with self- replicating information. Types of WORMS VIRUS: MAIL WORM PURE WORM
  • 12. TROJAN HORSE Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
  • 13. LOGICAL BOMBS A logical bomb is a destructive program that performs an activity when a certain action has occurred.
  • 15. Signature-Based Detection-Compare the contents of a file to a dictionary of virus.
  • 16. Behavior -Based Detection: Observe how the program execute in the computer Rather than looking for signature . Check the suspicious file and show warnings to the user.
  • 17. Heuristic -Based Detection:  Detect and remove all threats.  Create a generic signature.
  • 18. PREVENTION  Don't share Drive C: without a password and without read-only restrictions.  Use Anti-Virus.  Delete e-mail file attachments.  Have multiple backups of important files.  More secure operating systems e.g. UNIX