presentation on computer virus
DESCRIPTION
TRANSCRIPT
![Page 1: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/1.jpg)
PRESENTATION ON
COMPUTER VIRUS
SUBMITTED TO:Mr. ACHINTMs. SHIVANIC.S.E Department
SUBMITTED BY:YOGESH SINGH RAWATCSE 2ND YRRoll No.-120240101070
![Page 2: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/2.jpg)
CONTENTSINTRODUCTION.Similarities B/w Biological & Computer Virus.How Does A Virus Work?Life Cycle Of Computer Virus.Functional Diagram of VIRUS.Types Of VIRUS.Methods Of Detecting Virus By ANTI-VIRUS.Prevention.
![Page 3: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/3.jpg)
INTRODUCTION
COMPUTER VIRUS: A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and run against your wish.
ORA virus is illegal computer code that can do such things as alter programs or destroy data. Also, the virus can copy itself onto programs, thereby spreading its damaging effects.
![Page 4: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/4.jpg)
Similarities between biological virus and computer virus:
Computer virus are called viruses because they share some of the traits of biologicalViruses. A computer virus passed from computer to computer like a biological virusPasses from person to person
• Need a host for residence.• Capable of self-replicate.• Cause damage to host.
![Page 5: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/5.jpg)
How Does A VIRUS Spread? first the virus is linked to the host object in such
a way that it activates when the host object is used.
Second virus looks for other suitable carrier objects and attaches itself to them.
With this dependency virus slows down the system.
How does a virus work?
![Page 6: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/6.jpg)
The virus waits until user transmits the infected object to another
computer
User transmits an infected object to another computer
The virus locates and infects suitable objects on the new computer
A typical lifecycle of a computer virus
![Page 7: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/7.jpg)
VIRUS
ANTI- DETECTIN ROUTINES
COPYSEARC
H
FUNCTIONAL DIAGRAM OF VIRUS:
![Page 8: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/8.jpg)
TYPES OF VIRUSMACRO VIRUS.BOOT SECTOR VIRUS.WORMS.TROJEN HORSES.LOGIC BOMBS.
![Page 9: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/9.jpg)
MACRO VIRUS:A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk.
![Page 10: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/10.jpg)
BOOT SECTOR VIRUSA boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
![Page 11: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/11.jpg)
WORMSA worm is also a destructive program that fills a computer system with self-replicating information.
Types of WORMS VIRUS: MAIL WORM PURE WORM
![Page 12: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/12.jpg)
TROJAN HORSETrojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.
![Page 13: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/13.jpg)
LOGICAL BOMBSA logical bomb is a destructive program that performs an activity when a certain action has occurred.
![Page 14: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/14.jpg)
OTHERSTime BombScript VirusDirectory Virus
![Page 15: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/15.jpg)
Signature-Based Detection-Compare the contents of a file to a dictionary of virus.
METHODS OF DETECTING THE VIRUS BY ANTI-VIRUS:
![Page 16: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/16.jpg)
METHODS OF DETECTING THE VIRUS BY ANTI-VIRUS
Behavior -Based Detection:Observe how the program execute in the computerRather than looking for signature .
Check the suspicious file and show warnings to the user.
![Page 17: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/17.jpg)
METHODS OF DETECTING THE VIRUS BY ANTI-VIRUSHeuristic -Based Detection:Detect and remove all threats.
Create a generic signature.
![Page 18: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/18.jpg)
PREVENTIONDon't share Drive C: without a password
and without read-only restrictions.Use Anti-Virus.Delete e-mail file attachments.Have multiple backups of important files.
More secure operating systems e.g. UNIX
![Page 19: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/19.jpg)
ANY QUESTION
![Page 20: presentation on computer virus](https://reader036.vdocuments.site/reader036/viewer/2022082402/53f507e58d7f7246588b45a6/html5/thumbnails/20.jpg)
THANK YOU
HAPPY AND SAFE COMPUTING....