Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
34 views22 pages

Computerviruses 171008143158

Viruses can enter computers in several ways, including through email attachments, downloaded files, or infected websites. There are many types of viruses, including resident viruses that hide in memory, macro viruses that infect documents, boot sector viruses that infect startup areas, and polymorphic viruses that change their code to avoid detection. It is important to have antivirus software installed and updated, practice safe downloading and email habits, use firewalls and strong passwords, and back up files regularly to protect against virus infections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views22 pages

Computerviruses 171008143158

Viruses can enter computers in several ways, including through email attachments, downloaded files, or infected websites. There are many types of viruses, including resident viruses that hide in memory, macro viruses that infect documents, boot sector viruses that infect startup areas, and polymorphic viruses that change their code to avoid detection. It is important to have antivirus software installed and updated, practice safe downloading and email habits, use firewalls and strong passwords, and back up files regularly to protect against virus infections.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

1

Virus stands for Vital


Information Resource
under Siege.

2
How do viruses come to the computer?

1 2 3 4 5

Reference : The basics you can find anywhere 5 Steps To Successful Storytelling Published on April 5, 2014 Featured in: Marketing & Advertising
3
SYMTOMPS OF VIRUS INFECTION
5
VIRUSES

 A resident virus is a kind of  The virus goes into action  An overwriting virus is a
computer virus that hides when a specific condition is malicious program which,
and stores itself within the met. after infection, will effectively
computer memory, which destroy the original program
then allows it to infect any  infects the files in the folder code, typically by overwriting
file that is run by the where the virus is located as data in the system's memory.
computer, depending on the well as the directories
virus’ programming. specified in the Autoexec.bat  examples: Way, Trj.Reboot
file path.
 examples: Randex , CMJ
,Meve, and Mrlunky  example : Vienna virus

6
VIRUSES

 It infects the computer  A macro virus is a computer  These viruses change the
storage sector where startup virus that "infects" a Microsoft path that indicates the
files are found. Word or similar application location of a file.
and causes a sequence of
 The boot sector contains all actions to be performed  When you execute a .COM or
the files required to start the automatically when the .EXE file infected by virus,
operating system (OS) and application is started or you accidently run the virus
other bootable programs. something else triggers it. program.

 The viruses run at bootup,  Macro viruses tend to be  It is impossible to locate the
allowing them to execute surprising but relatively original files after it is
malicious code during harmless. infected.
startup time -- before many
security layers are executed,  example: Relax, Melissa. A,
A  example: Dir-2 virus
including antivirus software. Metys 7
eg: Polyboot.B
VIRUSES

 A polymorphic virus is a  It is a type of malware that  A companion virus is a


complicated computer virus infects executable files with complicated computer virus
that affects data types and the intent to cause permanent which, unlike traditional
functions. It is a self- damage or make them viruses, does not modify any
encrypted virus designed to unusable files. Instead, it creates a copy
avoid detection by a scanner of the file and places a
 A file-infecting
infecting virus different extension on it,
 Upon infection, the overwrites code or inserts usually .com.
polymorphic virus duplicates infected code into a
itself by creating usable, executable file.  This unique quality makes a
albeit slightly modified, companion virus difficult to
copies of itself.  example: Cleevix and Cascade detect

 example : Taureg  example: Terrax.1069


8
VIRUSES

 A FAT virus is a computer virus which attacks  They are not considered viruses because they
the file allocation table (FAT), a system used in do not replicate.
Microsoft products and some other types of
computer systems to access the information  A logic bomb is a piece of code inserted into
stored on a computer. an operating system or software application
that implements a malicious function after a
 It is considered as a very dangerous virus . certain amount of time, or specific conditions
are met.
 Damage caused can result in information losses
from individual files or even entire directories.

9
VIRUSES

 A Trojan horse program is a file that appears  A computer worm is a self-replicating


harmless unless it is executed. computer program that penetrates an
operating system with the intent of
 A destructive program that pretends to be a spreading malicious code.
useful application, but harms your computer or
steals your information after it's installed.  Worms utilize networks to send copies of
the original code to other computers,
 The name Trojan Horse has been derived from causing harm by consuming bandwidth or
the Greek mythology. possibly deleting files or sending documents
via email.

11
16 16
17
1
 Most Antivirus companies have come up with their
internet security suites over antivirus which is the
need right now. You must have one from reputed
providers in the industry such as Kaspersky, Eset,
Symantec etc. Remember “cheap” always isn't good.
The product which claims to give you 100%
protection is misleading you.

 Whether you use Windows/Mac or any Linux based


distribution you must have it updated with latest
security patches.

 Have a firewall installed and updated.

 Stop opening emails from unknown sources serving


you with attachments intended to not only Spam but
to make things like ransomware attacks happen.

18
2
 Scan your computer for viruses, malware
everyday/weekly by scheduling it into your security
product.
 Do not plug and play USB drives without scanning it
properly.
 Stop downloading and going for the free tag over the
internet when it comes to softwares. Most of them
come with bundled adwares, popups, malwares, weird
browser extensions that will slow down your computer.
 Look for “https://” tag when browsing a website. These
websites are encrypted and usually safe. But don't be
mistaken. Sites which spread piracy and illicit content
use them too these days by faking https certificates.
 Install Ublock Origin, Ghostery, Https Everywhere,
Privacy Badger extensions for Chrome/Firefox to block
most of the popups and malicious ads.
 Always check the file extension of a file you're about to
open after downloading from the internet. A .mp3 file
having a .exe extension means you're on the wrong
boat.
3
Defense : Level advanced
 Encrypt your entire computer right away at least (AES256 with SHA512) . Windows
users : BitLocker, Veracrypt etc. Linux users can encrypt their entire partition at
time of installation itself!
 Install “KeyScrambler” if on Windows which encrypts every keystroke from your
keyboard protecting you from keyloggers.
 Use a Password Manager like Lastpass/Dashlane. Get a reputed VPN like PIA,
NordVPN, ExpressVPN, F-Secure Secure Freedom etc. Free ones transport your data to
places you couldn't imagine.
 Use Two Factor Authentication everywhere you can.
 Have regular backups on external HDD and encrypt them too. Just remember the
password.
 Check your hosts file in Windows for any unidentified website and delete them.
Hosts file is locates in : C:/Windows/System32/drivers/etc/hosts. Open it with
notepad and do the intended.
 Never store financial information or documents of self without having proper
protection or be a victim of identity theft. Save them in encrypted folders if
needed. 20
PRESENTED BY
ALFRED GEORGE
THANK YOU

Neal Creative © Neal Creative | click & Learn more



Reference
 www.quora.com

 Internet, Web designing and


cyber security textbook.

 www.technopedia.com

 www.google.co.in/imghp

You might also like