Presentation by Mohak

Embed Size (px)

Citation preview

  • 8/13/2019 Presentation by Mohak

    1/20

  • 8/13/2019 Presentation by Mohak

    2/20

  • 8/13/2019 Presentation by Mohak

    3/20

  • 8/13/2019 Presentation by Mohak

    4/20

    At

    GlanceWhat is Virus?

    Hackers &Crackers

    Types ofComputer

    VirusesSome other

    HarmfulPrograms

    How youProtect your

    System

    againstViruses ?

  • 8/13/2019 Presentation by Mohak

    5/20

    A virus is a program that enters thecomputer system by attacking itself to

    another program and then spreads itselfacross the system.

  • 8/13/2019 Presentation by Mohak

    6/20

    There are two different types of people who write

    computer virus programs

    Hackers

    Crackers

    Hackersrefers to the people who use their skills to enter into

    computer system without authorization. Hackers are

    computer enthusiasts, who break into secure systems to gain

    knowledge about them and possibly use their knowledge toplay pranks.

    A Crackeris malicious programmer who gain unauthorized

    access to computer system for the purpose of stealing,altering or corrupting information.

  • 8/13/2019 Presentation by Mohak

    7/20

    There are so many types of computerviruses.

    Some of them are : Macro VirusFile Infector

    Resident VirusNetwork Virus

    Logic omboot Sector Virus

    Multipartite VirusStealth Virus

  • 8/13/2019 Presentation by Mohak

    8/20

    A macro virus is a computer virus that "infects" a

    Microsoft Word or similar application and causes a

    sequence of actions to be performed automatically

    when the application is started or something elsetriggers it. Macro viruses tend to be surprising but

    relatively harmless. A typical effect is the undesired

    insertion of some comic text at certain points when

    writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was

    the Melissa virus virus.

  • 8/13/2019 Presentation by Mohak

    9/20

    Phrasp the most common type of virus, the file infector

    takes root in a host file and then begins its operation

    when the file is executed. The virus may completelyoverwrite the file that it infects, or may only replace

    parts of the file. Some file infector viruses attack

    themselves to program file, usually selected .COM or

    .EXE file.

  • 8/13/2019 Presentation by Mohak

    10/20

    A board virus definition applies to any

    virus that inserts itself into a systemsmemory

  • 8/13/2019 Presentation by Mohak

    11/20

    A kind of virus spreads across networks in computers,

    for example, Nimda and SQL SLAMMER worms are

    viruses which spread over corporated networks or theinternet via e-mails.

  • 8/13/2019 Presentation by Mohak

    12/20

    A logic Bomb is a program that get executed only

    when specific condition is met. The virus: Friday the

    13th,, was so programmed so as to get executed on

    that perticular date.

  • 8/13/2019 Presentation by Mohak

    13/20

    A boot sector virus hides in the boot sector of hard

    disk. The boot sector is where your operating

    system is. So every time you boot your computer

    the virus gets loaded into the computer memory.

    Examples of boot-sector viruses are Polyboot B,

    AntiEXE.

  • 8/13/2019 Presentation by Mohak

    14/20

    This virus is spread by infected floppies and CDs.

    These viruses first infect the boot sector of hard drive

    and then infect the executable files stored in it. For ex.-

    Ywinz.

  • 8/13/2019 Presentation by Mohak

    15/20

    These are some virus which try to hide

    themselves from Anti-virus software byresorting some tricks. Stealth virus can

    safely show an anti-virus software that a

    certain file is uninfected.

  • 8/13/2019 Presentation by Mohak

    16/20

    A Trojan Horse program is a file that appears

    harmless unless it has executed. The Trojan Horse

    program disguises itself as a game or a utility

    program but when executed it can destroy the data

    stored in the computer. The name Trojan Horse hasbeen derived from Greek mythology.

  • 8/13/2019 Presentation by Mohak

    17/20

    Worms are small pieces of software that use

    computer network and security holes to replicateitself.

    Worms on the internet spread by e-mail it

    searches for all the address book of the mailing

    system. It then mails to all recipients.

  • 8/13/2019 Presentation by Mohak

    18/20

    Install a good Anti-Virus software on your computer.

    Update Anti-Virus regularly.

    Be careful while Downloading files or programs from the

    internet.

  • 8/13/2019 Presentation by Mohak

    19/20

  • 8/13/2019 Presentation by Mohak

    20/20

    PresentedBy

    Guided By : Vandana Maam