computer viruses presented by : vijitha.k. introduction
TRANSCRIPT
![Page 1: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/1.jpg)
Computer Viruses
Presented by : vijitha.k
![Page 2: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/2.jpg)
INTRODUCTION
![Page 3: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/3.jpg)
Virus: definition
a virus is a self replicating program. It may spread between files or disks but the defining character is that it can recreate itself without travelling to new host
![Page 4: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/4.jpg)
Overview
How virus infect computer SymptomsClassifying Viruses ExamplesProtection/PreventionConclusion
![Page 5: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/5.jpg)
How virus infect computer
virus can run before infect your computer
It can attach themselves to other programs
One infected attachment can copy itself to other files
![Page 6: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/6.jpg)
Virus risks
the internet
document and spreadsheets
programs
emailFloppy disk and cds
![Page 7: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/7.jpg)
Symptoms of Virus Attack
Computer runs slower then usual Computer no longer boots up Screen sometimes flicker PC speaker beeps periodically System crashes for no reason Files/directories sometimes disappear
![Page 8: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/8.jpg)
Classifying Virus - Types
Trojan HorseBack door trojansWorm Boot sector virusParasitic virusMacro
![Page 9: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/9.jpg)
Trojan Horse
CovertLeaks informationUsually does not reproduce
![Page 10: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/10.jpg)
Worms
Spread over network connectionWorms replicateFirst worm released on the Internet was
called Morris worm, it was released on Nov 2, 1988.
![Page 11: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/11.jpg)
Macro
Specific to certain applications Comprise a high percentage of the virusesUsually made in WordBasic and Visual
Basic for Applications (VBA) Microsoft shipped “Concept”, the first
macro virus, on a CD ROM called "Windows 95 Software Compatibility Test" in 1995
![Page 12: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/12.jpg)
Protection/Prevention
make users aware of the risk
Install antivirus software and update it regularly
Keep backups of all your data
![Page 13: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/13.jpg)
Sources of viruses
e mail
internet
![Page 14: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/14.jpg)
Anti virus softwares
scanners
Check summers
heuristics
![Page 15: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/15.jpg)
Mobile phones and palmtops
virus spread to mobiles through internet usage
Blue tooth
![Page 16: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/16.jpg)
precaution
scanning at the gateway or during data transfer
Virus scanning on the mobile device don’t install unexpected aplication reduce downloads
![Page 17: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/17.jpg)
Conclusion..
![Page 18: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/18.jpg)
Questions?
![Page 19: Computer Viruses Presented by : vijitha.k. INTRODUCTION](https://reader035.vdocuments.site/reader035/viewer/2022070413/5697bfed1a28abf838cb911e/html5/thumbnails/19.jpg)
Thank you….