SlideShare a Scribd company logo
1 of 11
Computer Virus
Malware
 Malware is used to describe any malicious program on a computer or mobile device
installed without the consent of the user and can cause a number of annoying effect such
as hard disk has more files; computer tends to run slower; computer start rebooting;
application takes time to load; computer hangs and restart its own.
 A malware may enter your computer system through the Internet or through an infected
pen drive, a DVD, a CD. For examle
 Sharing files- photos, audio or video
 Visiting malicious website
 Downloading free games, media players and other system utilities.
 Installing software without reading license agreements.
Computer Virus
 Malware is used to describe any malicious program
on a computer or mobile device installed without the
consent of the user and can cause a number of
annoying effect such as hard disk has more files;
computer tends to run slower; computer start
rebooting; application takes time to load; computer
hangs and restart its own.
 A malware may enter your computer system through
the Internet or through an infected pen drive, a DVD,
a CD. For examle
 Sharing files- photos, audio or video
 Visiting malicious website
 Downloading free games, media players and other
system utilities.
 Installing software without reading license
agreements.
Worms
 It is a program that replicates
and spreads itself to another
computer system with the help of
computer network.
 It does not target or infect
specific files already present on a
computer instead eat up the
memory on the disk space.
Trojan Horse
 It is a malicious program that
appear useful but in reality,
damages the files.
 It capture and store all keyboard
activity and mouse clicks.
 In this manner a Trojan easily
steals confidential information
such as account login and
password.
Spyware
 Spyware is sent to someone’s
computer intentionally to report
on the activities and preferences
of the computer’s user or
disclose information about the
data stored on computer.
 Examples :- Look2me, Zango
Adware
 It is an advertising-supported
software that generates revenue
for its developer by automatically
generating online advertisement
such as pop up ads.
Ransomware
 It is a type of malcious software
that threatens to publish the
victim’s data or limits user from
accessing their system and block
access to it unless a ransom is
paid.
 If you refuse to pay the data is
deleted.
Types of Computer Virus
 Macro virus infect certain types of data
files. Most macro viruses infect Microsoft
Office files.
 Examples. Relax, Melissa. A.
Macro Virus Boot Sector Virus
 Boot sector virus infect the boot record
on hard disks and also on CD’s and
DVD’s.
 A boot sector does not need to be able to
successfully boot the victim’s computer to
infect it.
 The boot sector virus stays in memory
and infects other storage medic such as
hard disk or any type of bootable media.
 Examples. Brain Virus, disk killer.
Memory
Resident Virus
 These viruses act when the
operating system starts running,
after which any open files can
get infected.
 Example . Randex, CMJ
 File infector viruses infect files
which contain executable code
such as .EXE .COM Files.
 This virus will stay in memory
and continue to infect other
programs or files when they
are executed.
File Infector
Virus Multipartite Virus
 The boot sector virus stays
in memory and infects
other storage medic such
as hard disk or any type of
bootable media.
 File infector viruses infect
files which contain
executable code such as
.EXE .COM Files.
Questions?

More Related Content

Similar to How Malware and Computer Viruses Work

Similar to How Malware and Computer Viruses Work (20)

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
Virus project
Virus projectVirus project
Virus project
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer virus
Computer virusComputer virus
Computer virus
 
athira m s.pptx
athira m s.pptxathira m s.pptx
athira m s.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Presentation on computer virus
Presentation on computer virusPresentation on computer virus
Presentation on computer virus
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
COMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer softwareCOMPUTER VIRUS affecting to computer software
COMPUTER VIRUS affecting to computer software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

How Malware and Computer Viruses Work

  • 2. Malware  Malware is used to describe any malicious program on a computer or mobile device installed without the consent of the user and can cause a number of annoying effect such as hard disk has more files; computer tends to run slower; computer start rebooting; application takes time to load; computer hangs and restart its own.  A malware may enter your computer system through the Internet or through an infected pen drive, a DVD, a CD. For examle  Sharing files- photos, audio or video  Visiting malicious website  Downloading free games, media players and other system utilities.  Installing software without reading license agreements.
  • 3. Computer Virus  Malware is used to describe any malicious program on a computer or mobile device installed without the consent of the user and can cause a number of annoying effect such as hard disk has more files; computer tends to run slower; computer start rebooting; application takes time to load; computer hangs and restart its own.  A malware may enter your computer system through the Internet or through an infected pen drive, a DVD, a CD. For examle  Sharing files- photos, audio or video  Visiting malicious website  Downloading free games, media players and other system utilities.  Installing software without reading license agreements.
  • 4. Worms  It is a program that replicates and spreads itself to another computer system with the help of computer network.  It does not target or infect specific files already present on a computer instead eat up the memory on the disk space.
  • 5. Trojan Horse  It is a malicious program that appear useful but in reality, damages the files.  It capture and store all keyboard activity and mouse clicks.  In this manner a Trojan easily steals confidential information such as account login and password.
  • 6. Spyware  Spyware is sent to someone’s computer intentionally to report on the activities and preferences of the computer’s user or disclose information about the data stored on computer.  Examples :- Look2me, Zango
  • 7. Adware  It is an advertising-supported software that generates revenue for its developer by automatically generating online advertisement such as pop up ads.
  • 8. Ransomware  It is a type of malcious software that threatens to publish the victim’s data or limits user from accessing their system and block access to it unless a ransom is paid.  If you refuse to pay the data is deleted.
  • 9. Types of Computer Virus  Macro virus infect certain types of data files. Most macro viruses infect Microsoft Office files.  Examples. Relax, Melissa. A. Macro Virus Boot Sector Virus  Boot sector virus infect the boot record on hard disks and also on CD’s and DVD’s.  A boot sector does not need to be able to successfully boot the victim’s computer to infect it.  The boot sector virus stays in memory and infects other storage medic such as hard disk or any type of bootable media.  Examples. Brain Virus, disk killer.
  • 10. Memory Resident Virus  These viruses act when the operating system starts running, after which any open files can get infected.  Example . Randex, CMJ  File infector viruses infect files which contain executable code such as .EXE .COM Files.  This virus will stay in memory and continue to infect other programs or files when they are executed. File Infector Virus Multipartite Virus  The boot sector virus stays in memory and infects other storage medic such as hard disk or any type of bootable media.  File infector viruses infect files which contain executable code such as .EXE .COM Files.