Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Virusppt

  • Sé el primero en comentar

Virusppt

  1. 1. Presented by Soumya Suchi(14300211047) Srirupa Das(14300211048) Subhajit Karakar(14300211049) Subhendu Paul(14300211050) Sumadhura Biswas(14300211051) Suman Bose(14300211052) Sumit Kr Singh(14300211053) COMPUTER VIRUS PROGRAMS IT Dept. GNIT
  2. 2. Table of contents • What is virus • How they spread • Impact of virus • Types of virus • Virus languages • Symptoms of virus attack • Antivirus and their working • Office protection • Outlook protection • Antivirus warning • Conclusion IT Dept. GNIT
  3. 3. What is a virus? • A computer program that is designed to replicate itself by copying itself into the other programs stored in a computer. It may be have a negative effect, such as causing a program to operate incorrectly or corrupting a computer's memory. • We can only catch a virus by running a program IT Dept. GNIT
  4. 4. How They Spread?? • Early viruses were pieces of code attached to a common program like popular games. • A person might download the infected game from internet or copy it and run it. • A virus is a small piece of code embedded in a large and runs when the large program is executed. IT Dept. GNIT
  5. 5. Continue... • The virus loads itself into memory • It searches for other programs in the disk. • If it finds other program , it modifies it to add the virus code to the program. • In this way it replicates it self , and it is run when the program is executed. • Next time they infect other programs and the cycle continues. IT Dept. GNIT
  6. 6. Impact of virus • One important tricks is the ability to load viruses into memory so that it can keep running in the background as long as the computers remain on. • This gives viruses a easier way to replicate themselves. • Another trick is the ability to infect the boot sector on hard disks. IT Dept. GNIT
  7. 7. • By putting its code in the boot sector the virus can guarantee that it gets executed. • It can load itself into the memory immediately, and it is able to run whether the computer is on. • It can infect the boot sector of any floppy disk inserted in the machine. Continue.... IT Dept. GNIT
  8. 8. Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macros Virus Script Virus Trojan Horse IT Dept. GNIT
  9. 9. Continue…. • Time Bomb : A time bomb is a virus program that performs an activity on a particular date. • Logical Bomb : A logical bomb is a destructive program that performs an activity when a certain action has occurred. • Worm Virus : A worm is also a destructive program that fills a computer system with self- replicating information, clogging the system so that its operations are slowed down or stopped. IT Dept. GNIT
  10. 10. Continue…. • Boot Sector Virus : A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk. • Macro Virus : A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk. IT Dept. GNIT
  11. 11. Continue…. • Script Virus : Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages. • Trojan Horse : Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. IT Dept. GNIT
  12. 12. Virus languages 1.ANSI COBOL 2. C/C++ 3. PASCAL 4. VBA (VISUAL BASIC FOR APPLICATIONS) 5. UNIX SHELL SCRIPT 6. JAVA SCRIPT IT Dept. GNIT
  13. 13. Symptoms of Virus Attack 1. Computer runs slower than usual. 2. Computer no longer Boots up. 3. Screen sometimes flicker. 4. PC speaker beeps periodically. 5. System crashes for no reason. 6. Files/directories sometimes disappear. 7. Denial of services (DoS). IT Dept. GNIT
  14. 14. Basic virus defense • Don’t open files that you are not expecting – Many viruses automatically send files without the e-mail account owner’s knowledge. – Ask the sender to confirm unexpected files. • Suspect messages that appear more than once in your Inbox – You may receive the same e-mail from a virus repeatedly. IT Dept. GNIT
  15. 15. Antivirus • Antivirus (or anti-virus) software is used to prevent, detect and remove malware, including computer viruses, worms and Trojan horses. • A software utility that searches a hard disk for viruses and removes any that are found. • These programs scan the code of every file on your computer for traces of viruses and spyware, and if found, the file is quarantined until the code can be removed or the file deleted. IT Dept. GNIT
  16. 16. Continue...  Updates : Antivirus programs can update themselves, keeping your computer's protection up to date without you having to manually update it.  Further Protection : If an antivirus software finds an infected file that cannot be deleted, it can quarantine the file so that it cannot infect other files or programs on your computer. IT Dept. GNIT
  17. 17. Functions Of Anti-viruses. Protection: Antivirus software can provide real-time protection, meaning it can prevent unwanted processes from accessing your computer while you surf the Internet. Cleanup: Antivirus software allows you to scan your computer for viruses and other unwanted programs, and provides you with the tools to get rid of them. Alerts: Antivirus programs can alert you when something is trying to access your computer, or when something in your computer is trying to access something on the Internet. IT Dept. GNIT
  18. 18. How antivirus works? • Specific scanning • Generic scanning • Heuristic analysis • Sandbox method IT Dept. GNIT
  19. 19. • A type of computer virus that is encoded as a macro embedded in a document. • Office allow macro programs to be embedded in documents(which can be virus), so that the programs may be run automatically when the document is opened. • When triggered, it will begin to embed itself in other documents and templates, as well as future ones created • Office will prompt you to enable macros Enable macros only when you know why office is asking. IT Dept. GNIT Office Protection
  20. 20. Outlook Protection • A user open a virus-infected attachment received via an Outlook e-mail message. • Certain vulnerabilities in HTML mail can force a malicious file attachment to run even if the user only views it in the preview pane or opens the message • Viruses can propagate themselves by reading the Outlook address books and sending new virus- infected messages to everyone found there IT Dept. GNIT
  21. 21. IT Dept. GNIT
  22. 22. Problems with AV • Unexpected renewal costs • Rogue security applications • Problems caused by false detection • Running multiple antivirus create conflicts • Some times disable updates such as Windows Service Packs or updating graphics card drivers • Conflict with a disk encryption program
  23. 23. Scope of antivirus • Protection from Viruses • Protection from Spyware and Identity Theft • Protection from Spam • Antivirus software detects about 25% of the most popular malware currently • CARO (Computer Antivirus Research Organization) is an organization that was established in 1990 to research and study malware
  24. 24. Other methods • Cloud Scanning • Network firewall • Specialist tools • Trend Micro's Root kit Buster • Avira's AntiVir Removal Tool • Bootable rescue disks like Avira AntiVir Rescue System, PCTools Alternate Operating System Scanner and AVG Rescue CD • Malwarebytes anti-malware
  25. 25. Conclusion • Although virus programming is a technique of making a error free system program which causes hazards to users, but it is useful to learn if the learner mind set will only be focused on use this knowledge ethically. IT Dept. GNIT
  26. 26. References: www.computervirus.co.in www.attackvirus.net www.educom.com www.googleimage.co.in www.antivirusmania.net IT Dept. GNIT

×