SlideShare une entreprise Scribd logo
1  sur  7
SPEAKER:
MADIHA AHMED
ROLL NO:
11761
1
Virus Entrance
Attachment Of Virus
Appearance Of Virus
Execution Or Running Of Effected Program
Computer System Get Effected With Virus 2
MADIHA AHMED 11761
There are literally dozens of ways for viruses to
enter into the computer system.
3
MADIHA AHMED 11761
Virus attaches to its target file or software
present in computer system .
4
MADIHA AHMED 11761
It can appear in the form of code, scripts, active content, other software and email attachments.
5
MADIHA AHMED 11761
EXECUTION OR RUNNING OF
PROGRAM
REPLICATION
6
MADIHA AHMED 11761
7
MADIHA AHMED 11761

Contenu connexe

Tendances

Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesAlienVault
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virusshusrusha
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAlienVault
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasuresprawinrajanIT
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultAlienVault
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileMarketingArrowECS_CZ
 
How to Investigate Threat Alerts in Spiceworks!
How to Investigate Threat Alerts in Spiceworks!	How to Investigate Threat Alerts in Spiceworks!
How to Investigate Threat Alerts in Spiceworks! AlienVault
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability ScanShawn Jordan
 
AlienVault Threat Alerts in Spiceworks
AlienVault Threat Alerts in SpiceworksAlienVault Threat Alerts in Spiceworks
AlienVault Threat Alerts in SpiceworksAlienVault
 
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-servicesAskPCTechies
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksKevinMax
 

Tendances (18)

Improve Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation DirectivesImprove Security Visibility with AlienVault USM Correlation Directives
Improve Security Visibility with AlienVault USM Correlation Directives
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Open Source
Open SourceOpen Source
Open Source
 
Open Source
Open SourceOpen Source
Open Source
 
Creating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVaultCreating Correlation Rules in AlienVault
Creating Correlation Rules in AlienVault
 
Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
How to Investigate Threat Alerts in Spiceworks!
How to Investigate Threat Alerts in Spiceworks!	How to Investigate Threat Alerts in Spiceworks!
How to Investigate Threat Alerts in Spiceworks!
 
Managed Vulnerability Scan
Managed Vulnerability ScanManaged Vulnerability Scan
Managed Vulnerability Scan
 
introtomalware
introtomalwareintrotomalware
introtomalware
 
Foss benifits
Foss benifitsFoss benifits
Foss benifits
 
AlienVault Threat Alerts in Spiceworks
AlienVault Threat Alerts in SpiceworksAlienVault Threat Alerts in Spiceworks
AlienVault Threat Alerts in Spiceworks
 
Virus removal-services
Virus removal-servicesVirus removal-services
Virus removal-services
 
Is the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacksIs the financial services industry vulnerable to constant cyber attacks
Is the financial services industry vulnerable to constant cyber attacks
 

Plus de Madiha Ahmed

Material management
Material managementMaterial management
Material managementMadiha Ahmed
 
Microbiology of hepatitis e virus
Microbiology of hepatitis e virusMicrobiology of hepatitis e virus
Microbiology of hepatitis e virusMadiha Ahmed
 
Microbiology protozoans
Microbiology protozoansMicrobiology protozoans
Microbiology protozoansMadiha Ahmed
 
Medicinal uses of ginger
Medicinal uses of gingerMedicinal uses of ginger
Medicinal uses of gingerMadiha Ahmed
 
Pharmaceutical gel
Pharmaceutical gelPharmaceutical gel
Pharmaceutical gelMadiha Ahmed
 
Thermogravimetry (instrumentation)
Thermogravimetry (instrumentation)Thermogravimetry (instrumentation)
Thermogravimetry (instrumentation)Madiha Ahmed
 
Labetalol and carvedilol
Labetalol and carvedilolLabetalol and carvedilol
Labetalol and carvedilolMadiha Ahmed
 
(Grp) good radiopharmaceutical practice
(Grp) good radiopharmaceutical practice(Grp) good radiopharmaceutical practice
(Grp) good radiopharmaceutical practiceMadiha Ahmed
 
New product developement
New product developementNew product developement
New product developementMadiha Ahmed
 
Clinical trials for product developement
Clinical trials for product developementClinical trials for product developement
Clinical trials for product developementMadiha Ahmed
 
Introduction to-vitamins
Introduction to-vitaminsIntroduction to-vitamins
Introduction to-vitaminsMadiha Ahmed
 
Steroids abuse and misuse
Steroids abuse and misuseSteroids abuse and misuse
Steroids abuse and misuseMadiha Ahmed
 
Vitamin c (medchem)
Vitamin c (medchem)Vitamin c (medchem)
Vitamin c (medchem)Madiha Ahmed
 

Plus de Madiha Ahmed (14)

Material management
Material managementMaterial management
Material management
 
Microbiology of hepatitis e virus
Microbiology of hepatitis e virusMicrobiology of hepatitis e virus
Microbiology of hepatitis e virus
 
Microbiology protozoans
Microbiology protozoansMicrobiology protozoans
Microbiology protozoans
 
Medicinal uses of ginger
Medicinal uses of gingerMedicinal uses of ginger
Medicinal uses of ginger
 
Pharmaceutical gel
Pharmaceutical gelPharmaceutical gel
Pharmaceutical gel
 
Thermogravimetry (instrumentation)
Thermogravimetry (instrumentation)Thermogravimetry (instrumentation)
Thermogravimetry (instrumentation)
 
Labetalol and carvedilol
Labetalol and carvedilolLabetalol and carvedilol
Labetalol and carvedilol
 
(Grp) good radiopharmaceutical practice
(Grp) good radiopharmaceutical practice(Grp) good radiopharmaceutical practice
(Grp) good radiopharmaceutical practice
 
New product developement
New product developementNew product developement
New product developement
 
Clinical trials for product developement
Clinical trials for product developementClinical trials for product developement
Clinical trials for product developement
 
Introduction to-vitamins
Introduction to-vitaminsIntroduction to-vitamins
Introduction to-vitamins
 
Steroids abuse and misuse
Steroids abuse and misuseSteroids abuse and misuse
Steroids abuse and misuse
 
Vitamin c (medchem)
Vitamin c (medchem)Vitamin c (medchem)
Vitamin c (medchem)
 
Pharmacognosy
PharmacognosyPharmacognosy
Pharmacognosy
 

How virus affects computer