SlideShare a Scribd company logo
1 of 42
Computer Viruses & Management Strategies

Dasun Hegoda
Software Engineer
What we are going to talk
●

What's Malware

●

Spyware, Adware, Backdoor

●

What's A Computer Virus

●

Why Computer Malware(Virus)

●

How Viruses Are Created

●

How Viruses Are Spread

●

Types Of Malware

●

Types Of Viruses
What we are going to talk
●

How To Detect A Malware(Virus)

●

How To Protect Yourself

●

Top Anti-Virus Programs

●

BuzzWords

●

Bottom Line
Malware Definitions
Malware Definitions
●

●

●

Malware, short for malicious software, is software used to
disrupt computer operation, gather sensitive information,
or gain access to private computer systems.
It can appear in the form of code, scripts, active content,
and other software.
Malware includes computer viruses, ransomware, worms,
trojan horses, rootkits, keyloggers, dialers, spyware,
adware, malicious BHOs, rogue security software and
other malicious programs.
Spyware, Adware, Backdoor
Spyware
●

●

●

●

Spyware is malicious computer program that does exactly what
its name implies Eg:, spies on you.
After downloading itself onto your computer either through an
email you opened, website you visited or a program you
downloaded, spyware scans your hard drive for personal
information and your internet browsing habits.
Some spyware programs contain keyloggers that will record
personal data you enter in to websites, such as your login
usernames and passwords, email addresses, browsing history as
well as sensitive banking and credit information.
Some spyware can interfere with your computer's system
settings, which can result in a slower internet connection.
Adware
●

●

●

Adware is any software that, once installed on your
computer, tracks your internet browsing habits and
sends you popups containing advertisements related to
the sites and topics you've visited.
While this type of software may sound innocent, and
even helpful, it consumes and slows down your
computer's processor and internet connection speed.
Additionally, some adware has keyloggers and spyware
built into the program, leading to greater damage to
your computer and possible invasion of your private
data.
Backdoor
●

●

●

●

A backdoor is a method of bypassing normal
authentication procedures.
Once a system has been compromised one or more
backdoors maybe installed in order to allow easier access
in the future.
Backdoors may also be installed prior to malicious
software, to allow attackers entry.
Crackers typically use backdoors to secure remote access
to a computer, while attempting to remain hidden from
casual inspection.
Computer Virus Definitions
What's A Computer Virus
●

●

A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs, data
files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to
be "infected".
Viruses often perform some type of harmful activity on
infected hosts, such as stealing hard disk space or CPU
time, accessing private information, corrupting data,
displaying political or humorous messages on the user's
screen, spamming their contacts, or logging their
keystrokes.
What's A Computer Virus
●

●

●

The defining characteristic of viruses is that they are
self-replicating computer programs which install
themselves without the user's consent.
Virus writers use social engineering and exploit detailed
knowledge of security vulnerabilities to gain access to
their hosts' computing resources.
The vast majority of viruses (over 99%) target systems
running Microsoft Windows, employing a variety of
mechanisms to infect new hosts, and often using
complex anti-detection/stealth strategies to evade
antivirus software.
World 1st Computer Virus
●

●

The first ever computer virus was developed in 1986 by
two Pakistani brothers in Lahore Pakistan.
It was named “Brain” and was designed by Amjad
Farooq Alvi and Basit Farooq Alvi with the intention of
discouraging the piracy of a software written by them.
Why Computer Malware(Virus)
Why Computer Malware(Virus)
●

Seeking profit

●

Desire to send a political message

●

Personal amusement

●

To demonstrate that a vulnerability exists in software

●

For sabotage and denial of service

●

To explore evolutionary algorithms

●

Cause systems failures.

●

Steal information.

●

To prove a point, to prove it can be done, to prove ones
skill or for revenge purposes.
How Viruses Are Created
How Viruses Are Created
●

●

●

●

The first step is that someone will create the virus.
The 2nd step is to pick out the program that the person
wants to attach to.
The 3rd step is attaching the virus to the program.
The 4th step is to try to lure or advertise the program,
so someone will download it in to your computer.

●

The 5th step is to have the virus get in to the computer.

●

The 6th step is to infect the computer.

●

The 7th step is to destroy all of the files on the
computer & more.
How Viruses Are Spread
How Viruses Are Spread
●

Email attachments

●

●

Rogue Websites

●

●

Networks

Instant Messaging
Fake Anti Virus
Software

Infected Boot Disks

●

From Mobile Devices

●

Phishing Schemes

●

Friends and Relatives

●

Infected Software

●

Hackers

●
Types Of Malware
Types Of Malware
●

●

Trojan horses : A Trojan horse is simply a computer
program. The program claims to do one thing (it may
claim to be a game) but instead does damage when
you run it (it may erase your hard disk). Trojan horses
have no way to replicate automatically.
Worms : A worm is a small piece of software that uses
computer networks and security holes to replicate itself.
A copy of the worm scans the network for another
machine that has a specific security hole. It copies itself
to the new machine using the security hole, and then
starts replicating from there, as well.
Types Of Malware

●

Viruses : A virus is a small piece of software that
piggybacks on real programs. For example, a virus
might attach itself to a program such as a spreadsheet
program. Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to reproduce (by
attaching to other programs).
Types Of Malware

●

E-mail viruses : An e-mail virus travels as an
attachment to e- mail messages, and usually replicates
itself by automatically mailing itself to dozens of people
in the victim's e-mail address book. Some e-mail
viruses don't even require a double-click -- they launch
when you view the infected message in the preview
pane of your e-mail software
Types Of Viruses
Types Of Viruses
●

Boot Sector Virus

●

Browser Hijacker

●

Direct Action Virus

●

File Infector Virus

●

Macro Virus

●

Multipartite Virus

●

Polymorphic Virus

●

Resident Virus

●

Web Scripting Virus
How To Detect A Virus
How To Detect A Malware(Virus)?
●

Programs takes longer to load.

●

The programs sizes keep changing.

●

The drive light keeps flashing when you are not doing
anything(Loading).

●

User created files have strange names.

●

The computer doesn't remember CMOS settings.

●

System crashes for no reason.

●

Screen sometimes flicker.

●

Files/directories sometimes disappear.
How To Detect A Malware(Virus)?
●

It might change the power ratings of your computer and
could blast the system.

●

You cannot print items correctly.

●

Disks or disk drives are inaccessible.

●

Applications on the computer do not work correctly.

●

Strange sounds or music plays from the speakers
unexpectedly.

●

Computer restarts every few minutes automatically.

●

…........
How To Protect Yourself
How To Protect Yourself
●

Use Antivirus Programs

●

Use Firewalls

●

Make Passwords Encrypted

●

Scan your PC Daily

●

Switch off net when not using

●

Don’t download software from unknown source

●

Disable Auto run

●

Read reviews before installing software
How To Protect Yourself
●

Download anti-spyware program

●

Don’t open e-mail that you are not sure

●

Keep backups

●

Keep OS up to date

●

Scan removable storages
Top Anti-Virus Programs
Top Anti-Virus Programs
●

Bitdefender Antivirus

●

Kaspersky Anti-Virus

●

Norton AntiVirus

●

F-Secure Anti-Virus

●

AVG Anti-Virus

●

Avast! Pro Antivirus

●

McAfee AntiVirus

●

Panda Antivirus Pro
Buzzwords
FireWalls
●

●

A firewall is a software or hardware-based network
security system that controls the incoming and
outgoing network traffic by analyzing the data packets
and determining whether they should be allowed
through or not, based on applied rule set.
Firewalls can be defined in many ways according to
your level of understanding. A firewall establishes a
barrier between a trusted, secure internal network and
another network (e.g., the Internet) that is not assumed
to be secure and trusted.
FireWalls
Antivirus software
●

●

●

Antivirus, anti-virus, or AV software is computer software used
to prevent, detect and remove malicious computer viruses.
Most software described as antivirus also works against other
types of malware, such as malicious Browser Helper Objects
(BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs,
dialers, fraudtools, adware and spyware.
Computer security, including protection from social
engineering techniques, is commonly offered in products and
services of antivirus software companies.
Boot sector
●

●

A boot sector or boot block is a region of a hard disk,
floppy disk, optical disc, or other data storage device
that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in
firmware.
The purpose of a boot sector is to allow the boot
process of a computer to load a program (usually, but
not necessarily, an operating system) stored on the
same storage device.
Encryption
●

●

●

Encryption is the process of encoding messages (or
information) in such a way that third parties cannot read
it, but only authorized parties can.
Encryption doesn't prevent hacking but it prevents the
hacker from reading the data that is encrypted.
The message or information (referred to as plaintext) is
encrypted using an encryption algorithm, turning it into
an unreadable ciphertext.
That's It!!!
Bottom Line
●

●

Computer viruses currently cause billions of dollars
worth of economic damage each year, due to causing
systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc.
In response, free, open-source anti-virus tools have
been developed, and a multi-billion dollar industry of
anti-virus software vendors has cropped up, selling
virus protection to Windows users. Unfortunately, no
currently existing anti-virus software is able to catch all
computer viruses.
References
●

www.makeuseof.com/tag/types-computer-viruses-watch/

More Related Content

What's hot

Mathetics Programming - Dr Umashree D K
Mathetics Programming - Dr Umashree D KMathetics Programming - Dr Umashree D K
Mathetics Programming - Dr Umashree D KDr Umashree D K
 
Unit 07 motivation in educational psychology
Unit 07  motivation in educational psychologyUnit 07  motivation in educational psychology
Unit 07 motivation in educational psychologyDARSGHAH
 
Information processing model
Information processing modelInformation processing model
Information processing modelzhaaye
 
philosophical sociological psychological of curriculum development
philosophical sociological psychological of curriculum developmentphilosophical sociological psychological of curriculum development
philosophical sociological psychological of curriculum developmentANALUZFUENTEBELLA
 
Behavior and its modification techniques
Behavior and its modification techniquesBehavior and its modification techniques
Behavior and its modification techniquesRangarajan S
 
Advance organizer model
Advance organizer modelAdvance organizer model
Advance organizer modelDrPritiSonar
 
Need and importance of information technology in education
Need and importance of information technology in educationNeed and importance of information technology in education
Need and importance of information technology in educationAshvini gupta
 
Linear and branched programme instruction
Linear and branched programme instructionLinear and branched programme instruction
Linear and branched programme instructionswaroophoppy
 
Teaching strategies in Special Education
Teaching strategies in Special EducationTeaching strategies in Special Education
Teaching strategies in Special EducationMohsin Aziz Kasher
 
Paradigm Shift in Education due to ICT
Paradigm Shift in Education due to ICTParadigm Shift in Education due to ICT
Paradigm Shift in Education due to ICTDr.Suresh Isave
 
BARRIERS AND BENEFITS OF INCLUSIVE EDUCATION
BARRIERS AND BENEFITS OF  INCLUSIVE   EDUCATION BARRIERS AND BENEFITS OF  INCLUSIVE   EDUCATION
BARRIERS AND BENEFITS OF INCLUSIVE EDUCATION Priyanka Chaurasia
 
Forms of education technology
Forms of education technology Forms of education technology
Forms of education technology rajni tripathi
 
Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]Akhilajs2
 
Challenges in integrating ict in school education
Challenges in integrating ict in school educationChallenges in integrating ict in school education
Challenges in integrating ict in school educationDr.Amol Ubale
 

What's hot (20)

Mathetics Programming - Dr Umashree D K
Mathetics Programming - Dr Umashree D KMathetics Programming - Dr Umashree D K
Mathetics Programming - Dr Umashree D K
 
Unit 07 motivation in educational psychology
Unit 07  motivation in educational psychologyUnit 07  motivation in educational psychology
Unit 07 motivation in educational psychology
 
smart classroom
  smart classroom    smart classroom
smart classroom
 
Information processing model
Information processing modelInformation processing model
Information processing model
 
philosophical sociological psychological of curriculum development
philosophical sociological psychological of curriculum developmentphilosophical sociological psychological of curriculum development
philosophical sociological psychological of curriculum development
 
Linear programmed learning
Linear programmed learningLinear programmed learning
Linear programmed learning
 
4. unit 3 reflective level bigge and hunt
4. unit 3 reflective level bigge and hunt4. unit 3 reflective level bigge and hunt
4. unit 3 reflective level bigge and hunt
 
Behavior and its modification techniques
Behavior and its modification techniquesBehavior and its modification techniques
Behavior and its modification techniques
 
Advance organizer model
Advance organizer modelAdvance organizer model
Advance organizer model
 
Aims and objectives of teaching computer science
Aims and objectives of teaching computer scienceAims and objectives of teaching computer science
Aims and objectives of teaching computer science
 
Need and importance of information technology in education
Need and importance of information technology in educationNeed and importance of information technology in education
Need and importance of information technology in education
 
Linear and branched programme instruction
Linear and branched programme instructionLinear and branched programme instruction
Linear and branched programme instruction
 
Teaching strategies in Special Education
Teaching strategies in Special EducationTeaching strategies in Special Education
Teaching strategies in Special Education
 
Paradigm Shift in Education due to ICT
Paradigm Shift in Education due to ICTParadigm Shift in Education due to ICT
Paradigm Shift in Education due to ICT
 
BARRIERS AND BENEFITS OF INCLUSIVE EDUCATION
BARRIERS AND BENEFITS OF  INCLUSIVE   EDUCATION BARRIERS AND BENEFITS OF  INCLUSIVE   EDUCATION
BARRIERS AND BENEFITS OF INCLUSIVE EDUCATION
 
Forms of education technology
Forms of education technology Forms of education technology
Forms of education technology
 
Web based learning [autosaved]
Web based learning [autosaved]Web based learning [autosaved]
Web based learning [autosaved]
 
Challenges in integrating ict in school education
Challenges in integrating ict in school educationChallenges in integrating ict in school education
Challenges in integrating ict in school education
 
The Common and Emerging Trends in E-learning
The Common and Emerging Trends in E-learning The Common and Emerging Trends in E-learning
The Common and Emerging Trends in E-learning
 
LEARNER CENTERED TEACHING
LEARNER CENTERED TEACHINGLEARNER CENTERED TEACHING
LEARNER CENTERED TEACHING
 

Viewers also liked

風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。Kenichirou Igari
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R LibraryDavid Faris
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahiImran Ismail
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)Vikas Pandey
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy dramatimeclarke94
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...Avalon Media System
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityAvalon Media System
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module Jm Olaybar
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]yatie1977
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement StatisticMark Blessington
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)plamen79
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-CVikas Pandey
 

Viewers also liked (20)

Avalon 2016 Overview
Avalon 2016 OverviewAvalon 2016 Overview
Avalon 2016 Overview
 
風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。風船と少年とイソギンチャク、空に昇る。
風船と少年とイソギンチャク、空に昇る。
 
Presentasi kk 2
Presentasi kk 2Presentasi kk 2
Presentasi kk 2
 
Sales Strategy
Sales StrategySales Strategy
Sales Strategy
 
lpSolve - R Library
lpSolve - R LibrarylpSolve - R Library
lpSolve - R Library
 
Mencari cahaya ilahi
Mencari cahaya ilahiMencari cahaya ilahi
Mencari cahaya ilahi
 
Archivo pdf
Archivo pdfArchivo pdf
Archivo pdf
 
Avalon 5.0 and Beyond
Avalon 5.0 and BeyondAvalon 5.0 and Beyond
Avalon 5.0 and Beyond
 
Mac OSx command line (terminal)
Mac OSx command line (terminal)Mac OSx command line (terminal)
Mac OSx command line (terminal)
 
American fantasy drama
American fantasy dramaAmerican fantasy drama
American fantasy drama
 
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
The Avalon Media System: An Open Source Audio/Video System for Libraries and ...
 
The Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and CommunityThe Avalon Media System: Implementation and Community
The Avalon Media System: Implementation and Community
 
X science 1st grading module
X science 1st grading module X science 1st grading module
X science 1st grading module
 
EL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBEREL FENÓMENO YOUTUBER
EL FENÓMENO YOUTUBER
 
Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar Avalon Media System Community Update Webinar
Avalon Media System Community Update Webinar
 
Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]Nota%20exam%20hadith[1]
Nota%20exam%20hadith[1]
 
The Displacement Statistic
The Displacement StatisticThe Displacement Statistic
The Displacement Statistic
 
Oracle world (1)
Oracle world (1)Oracle world (1)
Oracle world (1)
 
C and objective-C
 C  and  objective-C C  and  objective-C
C and objective-C
 
презентация для франчайзи
презентация для франчайзипрезентация для франчайзи
презентация для франчайзи
 

Similar to Computer Viruses & Management Strategies

Similar to Computer Viruses & Management Strategies (20)

Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious
MaliciousMalicious
Malicious
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malwares
MalwaresMalwares
Malwares
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus | Definition | Explaination
Computer virus | Definition | ExplainationComputer virus | Definition | Explaination
Computer virus | Definition | Explaination
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 

Recently uploaded

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 

Recently uploaded (20)

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 

Computer Viruses & Management Strategies

  • 1. Computer Viruses & Management Strategies Dasun Hegoda Software Engineer
  • 2. What we are going to talk ● What's Malware ● Spyware, Adware, Backdoor ● What's A Computer Virus ● Why Computer Malware(Virus) ● How Viruses Are Created ● How Viruses Are Spread ● Types Of Malware ● Types Of Viruses
  • 3. What we are going to talk ● How To Detect A Malware(Virus) ● How To Protect Yourself ● Top Anti-Virus Programs ● BuzzWords ● Bottom Line
  • 5. Malware Definitions ● ● ● Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  • 7. Spyware ● ● ● ● Spyware is malicious computer program that does exactly what its name implies Eg:, spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits. Some spyware programs contain keyloggers that will record personal data you enter in to websites, such as your login usernames and passwords, email addresses, browsing history as well as sensitive banking and credit information. Some spyware can interfere with your computer's system settings, which can result in a slower internet connection.
  • 8. Adware ● ● ● Adware is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. While this type of software may sound innocent, and even helpful, it consumes and slows down your computer's processor and internet connection speed. Additionally, some adware has keyloggers and spyware built into the program, leading to greater damage to your computer and possible invasion of your private data.
  • 9. Backdoor ● ● ● ● A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised one or more backdoors maybe installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection.
  • 11. What's A Computer Virus ● ● A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes.
  • 12. What's A Computer Virus ● ● ● The defining characteristic of viruses is that they are self-replicating computer programs which install themselves without the user's consent. Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses (over 99%) target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software.
  • 13. World 1st Computer Virus ● ● The first ever computer virus was developed in 1986 by two Pakistani brothers in Lahore Pakistan. It was named “Brain” and was designed by Amjad Farooq Alvi and Basit Farooq Alvi with the intention of discouraging the piracy of a software written by them.
  • 15. Why Computer Malware(Virus) ● Seeking profit ● Desire to send a political message ● Personal amusement ● To demonstrate that a vulnerability exists in software ● For sabotage and denial of service ● To explore evolutionary algorithms ● Cause systems failures. ● Steal information. ● To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.
  • 16. How Viruses Are Created
  • 17. How Viruses Are Created ● ● ● ● The first step is that someone will create the virus. The 2nd step is to pick out the program that the person wants to attach to. The 3rd step is attaching the virus to the program. The 4th step is to try to lure or advertise the program, so someone will download it in to your computer. ● The 5th step is to have the virus get in to the computer. ● The 6th step is to infect the computer. ● The 7th step is to destroy all of the files on the computer & more.
  • 18. How Viruses Are Spread
  • 19. How Viruses Are Spread ● Email attachments ● ● Rogue Websites ● ● Networks Instant Messaging Fake Anti Virus Software Infected Boot Disks ● From Mobile Devices ● Phishing Schemes ● Friends and Relatives ● Infected Software ● Hackers ●
  • 21. Types Of Malware ● ● Trojan horses : A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms : A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
  • 22. Types Of Malware ● Viruses : A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs).
  • 23. Types Of Malware ● E-mail viruses : An e-mail virus travels as an attachment to e- mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software
  • 25. Types Of Viruses ● Boot Sector Virus ● Browser Hijacker ● Direct Action Virus ● File Infector Virus ● Macro Virus ● Multipartite Virus ● Polymorphic Virus ● Resident Virus ● Web Scripting Virus
  • 26. How To Detect A Virus
  • 27. How To Detect A Malware(Virus)? ● Programs takes longer to load. ● The programs sizes keep changing. ● The drive light keeps flashing when you are not doing anything(Loading). ● User created files have strange names. ● The computer doesn't remember CMOS settings. ● System crashes for no reason. ● Screen sometimes flicker. ● Files/directories sometimes disappear.
  • 28. How To Detect A Malware(Virus)? ● It might change the power ratings of your computer and could blast the system. ● You cannot print items correctly. ● Disks or disk drives are inaccessible. ● Applications on the computer do not work correctly. ● Strange sounds or music plays from the speakers unexpectedly. ● Computer restarts every few minutes automatically. ● …........
  • 29. How To Protect Yourself
  • 30. How To Protect Yourself ● Use Antivirus Programs ● Use Firewalls ● Make Passwords Encrypted ● Scan your PC Daily ● Switch off net when not using ● Don’t download software from unknown source ● Disable Auto run ● Read reviews before installing software
  • 31. How To Protect Yourself ● Download anti-spyware program ● Don’t open e-mail that you are not sure ● Keep backups ● Keep OS up to date ● Scan removable storages
  • 33. Top Anti-Virus Programs ● Bitdefender Antivirus ● Kaspersky Anti-Virus ● Norton AntiVirus ● F-Secure Anti-Virus ● AVG Anti-Virus ● Avast! Pro Antivirus ● McAfee AntiVirus ● Panda Antivirus Pro
  • 35. FireWalls ● ● A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
  • 37. Antivirus software ● ● ● Antivirus, anti-virus, or AV software is computer software used to prevent, detect and remove malicious computer viruses. Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies.
  • 38. Boot sector ● ● A boot sector or boot block is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into randomaccess memory (RAM) by a computer system's built-in firmware. The purpose of a boot sector is to allow the boot process of a computer to load a program (usually, but not necessarily, an operating system) stored on the same storage device.
  • 39. Encryption ● ● ● Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, but only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. The message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext.
  • 41. Bottom Line ● ● Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source anti-virus tools have been developed, and a multi-billion dollar industry of anti-virus software vendors has cropped up, selling virus protection to Windows users. Unfortunately, no currently existing anti-virus software is able to catch all computer viruses.