SlideShare una empresa de Scribd logo
1 de 14
Page 1
VIRUSES AND WORMS




                    Page 2
VIRUS
Viruses are malicious programs that can cause
                damage to computer.
A computer virus attaches itself to a program or
 file enabling it to spread from one computer to
 another leaving infections as it travels. Almost
   all viruses are attached to an executable file
 which means the virus may exist on computer
but it actually infect our systems unless we run
           or open the malicious program.

                                            Page 3
A virus cannot be spread without a
human action (such as running an
infected file or program) to keep it
                going.
A virus is spread by sharing files or
  sending emails with viruses as
     attachments in the email.



                                        Page 4
How they work:
Basic structure:
{
    look for one or more infectable objects
    if (none found)
      exit
    else
      infect object
}
Doesn’t remain in memory, but executes all of
the viral code at once then returns control to the
infected program


                                                     Page 5
Ways to infect computer systems through
viruses.

Boot Sector Penetration
Macros Penetration

Parasites




                                     Page 6
WORMS
A worm is similar to view by design and is
considered to be a sub-class of a virus.
 Worms spread from one computer to another it has
the capability to travel without any human action.
It is an independent program that does not modify
other programs, but reproduces itself over and over
again until it slows down or shuts down a computer
system or network.




                                                Page 7
It uses computer network to spread itself.
It consumes too much system memory
Infects the environment rather than specific
objects
Worms send a copy of itself to everyone
listed on your email address book.
.




                                               Page 8
Difference between viruses and worms.
A virus an worms are similar in that they are both
forms of malicious software. The virus code is
injected into the previously benign program and is
spread when the program is run.
Examples of virus carrier programs are games, e-
mail attachments and animations

A worm is a malicious software which replicates
itself. A worm spreads from system to system
automatically, but virus needs another program in
order to spread.

                                                 Page 9
Characteristics of a Worm

Enhanced Targeting

Enhanced Speed

Enhanced Capabilities

Enhanced Destructive Power



                              Page 10
Phases of a worm or virus operation

Dormant Phase

Propagation Phase

Triggering Phase

Execution Phase




                                      Page 11
Types of viruses
Stealth Virus

Polymorphic Virus

Parasitic Virus

Memory-resident Virus

Boot Sector Virus



                         Page 12
Protecting your Computer System

To ensure that your OS is up-to-date

To have antivirus software and make sure it has
the capability to scan e-mail and files as they are
download from the internet

Need to run full disk scans periodically

Use a Firewall.



                                                      Page 13
Page 14

Más contenido relacionado

La actualidad más candente

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 

La actualidad más candente (20)

Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ransomware
RansomwareRansomware
Ransomware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Security threats
Security threatsSecurity threats
Security threats
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer security and
Computer security andComputer security and
Computer security and
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 

Destacado

Destacado (8)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Virus and worms

Similar a Virus and worms (20)

ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Virus
VirusVirus
Virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

Último

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Último (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Virus and worms

  • 3. VIRUS Viruses are malicious programs that can cause damage to computer. A computer virus attaches itself to a program or file enabling it to spread from one computer to another leaving infections as it travels. Almost all viruses are attached to an executable file which means the virus may exist on computer but it actually infect our systems unless we run or open the malicious program. Page 3
  • 4. A virus cannot be spread without a human action (such as running an infected file or program) to keep it going. A virus is spread by sharing files or sending emails with viruses as attachments in the email. Page 4
  • 5. How they work: Basic structure: { look for one or more infectable objects if (none found) exit else infect object } Doesn’t remain in memory, but executes all of the viral code at once then returns control to the infected program Page 5
  • 6. Ways to infect computer systems through viruses. Boot Sector Penetration Macros Penetration Parasites Page 6
  • 7. WORMS A worm is similar to view by design and is considered to be a sub-class of a virus. Worms spread from one computer to another it has the capability to travel without any human action. It is an independent program that does not modify other programs, but reproduces itself over and over again until it slows down or shuts down a computer system or network. Page 7
  • 8. It uses computer network to spread itself. It consumes too much system memory Infects the environment rather than specific objects Worms send a copy of itself to everyone listed on your email address book. . Page 8
  • 9. Difference between viruses and worms. A virus an worms are similar in that they are both forms of malicious software. The virus code is injected into the previously benign program and is spread when the program is run. Examples of virus carrier programs are games, e- mail attachments and animations A worm is a malicious software which replicates itself. A worm spreads from system to system automatically, but virus needs another program in order to spread. Page 9
  • 10. Characteristics of a Worm Enhanced Targeting Enhanced Speed Enhanced Capabilities Enhanced Destructive Power Page 10
  • 11. Phases of a worm or virus operation Dormant Phase Propagation Phase Triggering Phase Execution Phase Page 11
  • 12. Types of viruses Stealth Virus Polymorphic Virus Parasitic Virus Memory-resident Virus Boot Sector Virus Page 12
  • 13. Protecting your Computer System To ensure that your OS is up-to-date To have antivirus software and make sure it has the capability to scan e-mail and files as they are download from the internet Need to run full disk scans periodically Use a Firewall. Page 13