SlideShare a Scribd company logo
3
Most read
6
Most read
16
Most read
Cause and effects of computer virus
Agenda
1.Computer virus
3. Symptoms
4. Risky file type
6. Types Of Viruses
2.History
• A computer virus is a
computer program that can
copy itself and infect a
computer without permission
or knowledge of the user.
• A computer virus can only
spread from one computer to
another when its host is taken
to the uninfected computer,
for instance by a user sending
it over a network or the
Internet, or by carrying it on a
removable medium such as a
floppy disk, CD, or USB drive.
1981 Apple Viruses 1, 2, & 3
1980’s Fred Cohen
1987 Lehigh Virus
1988 The first anti virus software
1990 The first polymorphic viruses
1991 Symantec releases Norton Anti Virus
1992 The Michelangelo Virus
1994 Kaos4 virus spreads via adult websites.
The following are a few Symptoms that your
computer might have a virus:
• Slow response and slow program execution.
• Random hard drive crashes and restarts.
• Distorted graphics and text.
• Files that have mysteriously vanished.
•
• Inability to open files with existing passwords.
Examples of risky file types
The following file types should be treated with suspicion
and be confirmed with the sender before being opened:
 .exe
 .pif
 .bat
 .vbs
 .com
1. Boot Sector Virus.
2. Direct Action Virus.
3. File Infector Virus.
4. Macro Virus.
5. Multipartite Virus.
6. Polymorphic Virus.
7. Resident Virus.
8. Web Scripting Virus.
It places its own codes
and commands into
MBR.
Alters the search and
error page of a
browser and redirects
the user to its own
page.
•They load with the host program into
computer’s memory.
•They can be crafted with relative ease.
File Infector Virus
A file infector is a virus that infects an
executable file.
Typically affects only one type of file.
Macro Virus
• These type of virus infects word , excel,
PowerPoint, access and other data files.
Once infected repairing of these files is
very much difficult.
• May attack in more than one methods.
• A virus that can
encrypt its code in
different ways so
that it appears
differently in each
infection. These
viruses are more
difficult to detect.
• Hides within the computers memory.
• It activates whenever the OS loads or operates.
• This virus may be pernicious.
• It is of 2 types:
Fast Infector.
Slow Infector.
• Removal of this virus is bit tricky.
• It may be designed to block the actions of Anti
Virus programs.
There are few website that execute complex
code with the purpose to provide interesting
content ,these codes often get exploited and
due to this a virus becomes able to infect a
machine and to take actions on a machine via
website. This particular virus is called web
scripting virus
Cause and effects of computer virus
Cause and effects of computer virus
Infects computers running with
Microsoft Windows.
Discovered by IT security firm Seculert,
in December 2012.
Steals confidential data of the user.
Affects POS i.e. Point of sales.
Detected in online banking transaction
space on 19 January 2014 in India.
Cause and effects of computer virus
In 2012, a major ransom ware worm known as
Reveton began to spread.
A Reveton is a malware which attempts to
extort money from a user.
It claims that your computer has been used for
unauthorized activities.
THANK YOU!

More Related Content

PPTX
Computer virus
PPTX
Computer virus and antivirus
PPT
Computer viruses
PPTX
Types of Virus & Anti-virus
PPT
How Computer Viruses Work
PPT
Computer viruses
PPT
Virus, Worms And Antivirus
ODP
Computer virus
Computer virus
Computer virus and antivirus
Computer viruses
Types of Virus & Anti-virus
How Computer Viruses Work
Computer viruses
Virus, Worms And Antivirus
Computer virus

What's hot (20)

PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
PPTX
Computer virus
PPTX
Computer virus
PPTX
Computer Virus
PPTX
computer virus ppt.pptx
PPTX
What is a virus and anti virus
PPT
Stuxnet - Case Study
PPT
Computer viruses
PPTX
Computer virus
PPTX
PPTX
Computer Viruses
PPTX
Antivirus software
PPTX
Antivirus
PDF
Malware and security
PPTX
Computer virus !!!!!
PPTX
PPTX
Virus and types of antivirus
PDF
Computer viruses
ANTIVIRUS AND VIRUS Powerpoint presentation
Virus and Anti Virus - Types of Virus and Anti Virus
Computer virus
Computer virus
Computer Virus
computer virus ppt.pptx
What is a virus and anti virus
Stuxnet - Case Study
Computer viruses
Computer virus
Computer Viruses
Antivirus software
Antivirus
Malware and security
Computer virus !!!!!
Virus and types of antivirus
Computer viruses
Ad

Similar to Cause and effects of computer virus (20)

PPTX
Virus and malware presentation
PPTX
Virus and its types 2
PPTX
TLE ICT 10 Q3 - VIRUS and its Types.pptx
PPTX
Computer viruses
PPTX
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
PDF
Viruses and antiviruses
DOCX
Computer viruses by joy chakraborty
PPTX
Computer Introduction (Computer Viruses )-Lecture04
PPTX
Cybercrime: Virus and Defense
PPT
Itc lec 15 Computer security risks
PPTX
PPT
computervirus.ppt
PPTX
Computer viruses - A daily harm
ODP
Viruses andthreats@dharmesh
PPTX
a pptx presentation file about computer viruses
PPT
Rajul computer presentation
DOC
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
PPTX
HOW HACKERS CONDUCT CYBER WARFARE
PPTX
Viruses & worms
PDF
Computer virus
Virus and malware presentation
Virus and its types 2
TLE ICT 10 Q3 - VIRUS and its Types.pptx
Computer viruses
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
Viruses and antiviruses
Computer viruses by joy chakraborty
Computer Introduction (Computer Viruses )-Lecture04
Cybercrime: Virus and Defense
Itc lec 15 Computer security risks
computervirus.ppt
Computer viruses - A daily harm
Viruses andthreats@dharmesh
a pptx presentation file about computer viruses
Rajul computer presentation
Chapter 2- Computer Threat.docChapter 2- Computer Threat.doc
HOW HACKERS CONDUCT CYBER WARFARE
Viruses & worms
Computer virus
Ad

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
1. Introduction to Computer Programming.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Tartificialntelligence_presentation.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Modernising the Digital Integration Hub
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
STKI Israel Market Study 2025 version august
Architecture types and enterprise applications.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
The various Industrial Revolutions .pptx
Group 1 Presentation -Planning and Decision Making .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
1. Introduction to Computer Programming.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Final SEM Unit 1 for mit wpu at pune .pptx
Tartificialntelligence_presentation.pptx
cloud_computing_Infrastucture_as_cloud_p
TLE Review Electricity (Electricity).pptx
O2C Customer Invoices to Receipt V15A.pptx
DP Operators-handbook-extract for the Mautical Institute
WOOl fibre morphology and structure.pdf for textiles
NewMind AI Weekly Chronicles – August ’25 Week III
Modernising the Digital Integration Hub
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
OMC Textile Division Presentation 2021.pptx
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
STKI Israel Market Study 2025 version august

Cause and effects of computer virus

  • 2. Agenda 1.Computer virus 3. Symptoms 4. Risky file type 6. Types Of Viruses 2.History
  • 3. • A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. • A computer virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 4. 1981 Apple Viruses 1, 2, & 3 1980’s Fred Cohen 1987 Lehigh Virus 1988 The first anti virus software 1990 The first polymorphic viruses 1991 Symantec releases Norton Anti Virus 1992 The Michelangelo Virus 1994 Kaos4 virus spreads via adult websites.
  • 5. The following are a few Symptoms that your computer might have a virus: • Slow response and slow program execution. • Random hard drive crashes and restarts. • Distorted graphics and text. • Files that have mysteriously vanished. • • Inability to open files with existing passwords.
  • 6. Examples of risky file types The following file types should be treated with suspicion and be confirmed with the sender before being opened:  .exe  .pif  .bat  .vbs  .com
  • 7. 1. Boot Sector Virus. 2. Direct Action Virus. 3. File Infector Virus. 4. Macro Virus. 5. Multipartite Virus. 6. Polymorphic Virus. 7. Resident Virus. 8. Web Scripting Virus.
  • 8. It places its own codes and commands into MBR.
  • 9. Alters the search and error page of a browser and redirects the user to its own page.
  • 10. •They load with the host program into computer’s memory. •They can be crafted with relative ease.
  • 11. File Infector Virus A file infector is a virus that infects an executable file. Typically affects only one type of file.
  • 12. Macro Virus • These type of virus infects word , excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.
  • 13. • May attack in more than one methods.
  • 14. • A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.
  • 15. • Hides within the computers memory. • It activates whenever the OS loads or operates. • This virus may be pernicious. • It is of 2 types: Fast Infector. Slow Infector. • Removal of this virus is bit tricky. • It may be designed to block the actions of Anti Virus programs.
  • 16. There are few website that execute complex code with the purpose to provide interesting content ,these codes often get exploited and due to this a virus becomes able to infect a machine and to take actions on a machine via website. This particular virus is called web scripting virus
  • 19. Infects computers running with Microsoft Windows. Discovered by IT security firm Seculert, in December 2012. Steals confidential data of the user. Affects POS i.e. Point of sales. Detected in online banking transaction space on 19 January 2014 in India.
  • 21. In 2012, a major ransom ware worm known as Reveton began to spread. A Reveton is a malware which attempts to extort money from a user. It claims that your computer has been used for unauthorized activities.