VIRUS
AND
ITS TYPES
What is virus
What is a computer virus?
• A computer virus is a type of malware that, when executed, replicates by
inserting copies of itself (possibly modified) into other computer programs,
data files , or the boot sector of the hard drive; when this replication
succeeds, the affected areas are then said to be "infected". Viruses often
perform some type of harmful activity on infected hosts, such as
stealing hard disk space or CPU time, accessing private information,
corrupting data. However, not all viruses carry a destructive payload or
attempt to hide themselves.
• The vast majority of viruses (over 99%) target systems running Microsoft
Windows, employing a variety of mechanisms to infect new hosts, and
often using complex anti-detection/stealth strategies to evade antivirus
software.
How a computer virus spreads?
For a computer virus to spread through a computer system, or
network, it must be activated. This means that the file that contains the
virus must be opened, or executed in order for the virus to come to life.
After it gets activated, these viruses look for certain programs to infect.
The main and the important that you must note is that, all viruses seem
to do well is duplicate themselves within the programs they find, and
this is the main reason as to how they spread well.
1. Email attachments.
2. Rogue Websites.
3. Hackers/fake Anti Virus Software
TYPES OF VIRUS
Types of computer viruses
• Trojan Horse
A program written to deliver a malicious program that may then
cause destruction to your computer. A Trojan horse is delivered by
someone or hidden within another program that may seem harmless.
• Spyware
A program written to monitor your actions on a computer. A
common type of spyware is a key-logger program. This program can
record every key stroke and mouse click you make. Spyware can be
delivered via a Trojan horse program.
• Boot Sector Virus
Not so common anymore, but they were nasty little programs that got loaded into
your master boot record. Most commonly spread by floppy disks. These viruses
could then launch themselves before your operating system even loaded.
• Time Bomb
A virus written to execute at a later date or upon an action
performed. These programs lay dormant until an event occurs.
• Browser Hijacker
A virus that will over take your web browser and automatically redirect you to
another website.
• File Infector Virus
A virus that lives within a file, typically a .exe file. When the file is executed, it
will then run its nasty code.
• Adware
Adware is a form of malware. One word - pop-ups. Adware is
designed to pop up advertisements. Adware can be very annoying.
• Worms
Just a nasty little program to cause slowness in a network. A worm
will replicate itself and spread from computer to computer. Worms are
commonly spread through email attachments.
• Polymorphic Virus
A virus written to change itself in order to evade virus detection.
Ransomware
• Ransomware is a type of malicious software from cryptovirology that
threatens to publish the victim's data or perpetually block access to it
unless a ransom is paid. While some simple ransomware may lock the
system in a way which is not difficult for a knowledgeable person to
reverse, more advanced malware uses a technique called cryptoviral
extortion, in which it encrypts the victim's files, making them inaccessible,
and demands a ransom payment to decrypt them.In a properly
implemented cryptoviral extortion attack, recovering the files without the
decryption key is an intractable problem – and difficult to trace digital
currencies such as Ukash and Bitcoin are used for the ransoms, making
tracing and prosecuting the perpetrators difficult.
Ransomware attacks are typically carried out using a Trojan that is
disguised as a legitimate file that the user is tricked into downloading
or opening when it arrives as an email attachment. However, one high-
profile example, the "WannaCry worm", traveled automatically
between computers without user interaction.
THANK YOU

More Related Content

PPTX
Virus and antivirus
PPTX
Computer virus
PPTX
Computer virus
PPTX
Virus and worms
PPT
Computer virus
PDF
How To Protect From Malware
PPTX
Computer viruses
PPTX
Computer Virus
Virus and antivirus
Computer virus
Computer virus
Virus and worms
Computer virus
How To Protect From Malware
Computer viruses
Computer Virus

What's hot (20)

PPTX
What is Ransomware
PPT
How Computer Viruses Work
PPTX
Computer virus
PPTX
PPTX
Cyber security
PPTX
Computer virus (Microsoft Powerpoint)
PPTX
Computer Malware and its types
PPTX
Computer virus
PPTX
Computer Virus
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPTX
Malware ppt
PPTX
PPT
Virus project
PPTX
Presentation on Computer Viruses
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPTX
Computer virus
PPTX
spyware
PPS
introduction to malwares,virus,trojan horse
PPTX
Computer virus
PPS
Virus & Computer security threats
What is Ransomware
How Computer Viruses Work
Computer virus
Cyber security
Computer virus (Microsoft Powerpoint)
Computer Malware and its types
Computer virus
Computer Virus
ANTIVIRUS AND VIRUS Powerpoint presentation
Malware ppt
Virus project
Presentation on Computer Viruses
Malware and Anti-Malware Seminar by Benny Czarny
Computer virus
spyware
introduction to malwares,virus,trojan horse
Computer virus
Virus & Computer security threats
Ad

Similar to Virus and its types 2 (20)

PPTX
Computer virus
PPT
Malwares
PPTX
Computer viruses
PPTX
PowerPoint presentation about computer virus
PPTX
Virus and malware presentation
PPT
Computer Virus
PPT
PPTX
What is a Malware - Kloudlearn
PPTX
TLE ICT 10 Q3 - VIRUS and its Types.pptx
PPTX
NS 2.pptx
PPTX
Computer Viruses
PPTX
Introductions To Malwares
PPTX
malware ppt.pptx
DOCX
Computer virus
PPTX
Computer Viruses
PPTX
Malware part 2
PPTX
1311782 634629102605888750
PDF
What are Computer Viruses.pdf
PPTX
lecture-11-30052022-103626am.pptx
ODP
Computer virus
Computer virus
Malwares
Computer viruses
PowerPoint presentation about computer virus
Virus and malware presentation
Computer Virus
What is a Malware - Kloudlearn
TLE ICT 10 Q3 - VIRUS and its Types.pptx
NS 2.pptx
Computer Viruses
Introductions To Malwares
malware ppt.pptx
Computer virus
Computer Viruses
Malware part 2
1311782 634629102605888750
What are Computer Viruses.pdf
lecture-11-30052022-103626am.pptx
Computer virus
Ad

Recently uploaded (20)

PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
International_Financial_Reporting_Standa.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
IGGE1 Understanding the Self1234567891011
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
International_Financial_Reporting_Standa.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Computer Architecture Input Output Memory.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Hazard Identification & Risk Assessment .pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Uderstanding digital marketing and marketing stratergie for engaging the digi...
Share_Module_2_Power_conflict_and_negotiation.pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
What if we spent less time fighting change, and more time building what’s rig...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
HVAC Specification 2024 according to central public works department
IGGE1 Understanding the Self1234567891011

Virus and its types 2

  • 2. What is virus What is a computer virus? • A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files , or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data. However, not all viruses carry a destructive payload or attempt to hide themselves. • The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  • 3. How a computer virus spreads? For a computer virus to spread through a computer system, or network, it must be activated. This means that the file that contains the virus must be opened, or executed in order for the virus to come to life. After it gets activated, these viruses look for certain programs to infect. The main and the important that you must note is that, all viruses seem to do well is duplicate themselves within the programs they find, and this is the main reason as to how they spread well. 1. Email attachments. 2. Rogue Websites. 3. Hackers/fake Anti Virus Software
  • 4. TYPES OF VIRUS Types of computer viruses • Trojan Horse A program written to deliver a malicious program that may then cause destruction to your computer. A Trojan horse is delivered by someone or hidden within another program that may seem harmless. • Spyware A program written to monitor your actions on a computer. A common type of spyware is a key-logger program. This program can record every key stroke and mouse click you make. Spyware can be delivered via a Trojan horse program.
  • 5. • Boot Sector Virus Not so common anymore, but they were nasty little programs that got loaded into your master boot record. Most commonly spread by floppy disks. These viruses could then launch themselves before your operating system even loaded. • Time Bomb A virus written to execute at a later date or upon an action performed. These programs lay dormant until an event occurs. • Browser Hijacker A virus that will over take your web browser and automatically redirect you to another website. • File Infector Virus A virus that lives within a file, typically a .exe file. When the file is executed, it will then run its nasty code.
  • 6. • Adware Adware is a form of malware. One word - pop-ups. Adware is designed to pop up advertisements. Adware can be very annoying. • Worms Just a nasty little program to cause slowness in a network. A worm will replicate itself and spread from computer to computer. Worms are commonly spread through email attachments. • Polymorphic Virus A virus written to change itself in order to evade virus detection.
  • 7. Ransomware • Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and Bitcoin are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
  • 8. Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high- profile example, the "WannaCry worm", traveled automatically between computers without user interaction.

Editor's Notes

  • #8: Mostly this virus is sent through email and it has extension of .exe or bat file