SlideShare une entreprise Scribd logo
1  sur  16
PRESENTATION
INTRODUCTION TO
COMPUTER VIRUS
 What is computer virus ?
 Types of computer virus?
 What a computer virus do?
 Sources of Computer Virus Attack.
 Prevention from computer virus
 Best antivirus software.
Virus
*A computer virus is a software program with a
ability to make copies of itself ,which attacks
itself to other applications or files.
Types of computer Virus.
 There are three types of computer virus
Boot virus
Program virus
Micro virus
BOOT VIRUS:
 Boot viruses infects the boot records of hard disk and
floppy disks. Generally these are considered more
dangerous than program viruses.
Program Virus
 These viruses infect program files, which have
extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR.
program files are attractive targets for computer virus
because they are widely used and have relativity, simple
formats to which viruses can attach themselves.
Macro Viruses
 These viruses infects data files. For example, Microsoft
word document and template files are susceptible to
macro virus attacks they spread rapidly as infected
documents are shared on networks or downloaded from
internet sites.
What a computer virus do?
 A virus tries to take control of computer system it has infected
at the first opportunity availible.it makes copies of itself and
also try to carry harmful task written in its program. This
process can happen so quickly that the user is not even
aware of the presence of a virus in his/her computer.
Top 5 Sources of Computer
Virus Attack
The most potent and vulnerable threat of computer users is
virus attacks. Virus attacks hampers important work involved
with data and documents. It is imperative for every computer
user to be aware about the software and programs that can help
to protect the personal computers from attacks. One must take
every possible measure in order to keep the computer systems
free from virus attacks. The top sources of virus attacks are
highlighted below:
Downloadable Programs
Cracked Software
Email Attachments
Internet
Booting From CD
Best antivirus software.
 Norton antivirus.
 MacAfee virus scan
 Kaspersky antivirus
Norton antivirus
 Norton antivirus is a product of Symantec corporation.
Founded in 1982.
 Notion check the following program
• Boot record s
• Programs(at the time you used them)
• All local hard drives,
• Files download from internet,
• Usb(when in use)
MacAfee virus scan
MacAfee, Inc. is an antivirus software and computer security
company headquartered in Santa Clara, California. It markets
McAfee Virus Scan and related security products and
services, including the Intercept, and Found stone brands. ...
Kaspersky ANTIVIRUS
 Kaspersky is product of Kaspersky lab,
 A Russian computer security company,
• Co-founded by Natalya Kaspersky antivirus, do the
following things
• Invites virus scan by opening the Kaspersky antivirus
window.
Computer Virus powerpoint presentation

Contenu connexe

Tendances

Tendances (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus class 7
Virus class 7Virus class 7
Virus class 7
 
Anti virus
Anti virusAnti virus
Anti virus
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Web browser
Web browserWeb browser
Web browser
 
Presentation on operating system
 Presentation on operating system Presentation on operating system
Presentation on operating system
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer security
Computer securityComputer security
Computer security
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
system software and application software
system software and application softwaresystem software and application software
system software and application software
 
Types of software
Types of softwareTypes of software
Types of software
 
Types of application software
Types of application softwareTypes of application software
Types of application software
 
What is malware
What is malwareWhat is malware
What is malware
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
 

En vedette

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
eg-353-paper687856
eg-353-paper687856eg-353-paper687856
eg-353-paper687856JOYAL JACOB
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithmgarima931
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power pointoacore2
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer systemlistergc
 

En vedette (20)

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
eg-353-paper687856
eg-353-paper687856eg-353-paper687856
eg-353-paper687856
 
STEAM NOZZLES
STEAM NOZZLESSTEAM NOZZLES
STEAM NOZZLES
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
KNIME tutorial
KNIME tutorialKNIME tutorial
KNIME tutorial
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Genetic algorithm
Genetic algorithmGenetic algorithm
Genetic algorithm
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
Network management
Network managementNetwork management
Network management
 
Computer technology power point
Computer technology power pointComputer technology power point
Computer technology power point
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 

Similaire à Computer Virus powerpoint presentation

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programsAnuj Pawar
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentationRakibul islam
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 

Similaire à Computer Virus powerpoint presentation (20)

Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
COMPUTER VIRUS.pptx
COMPUTER  VIRUS.pptxCOMPUTER  VIRUS.pptx
COMPUTER VIRUS.pptx
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Computer virus
Computer virusComputer virus
Computer virus
 
Antivirus security
Antivirus securityAntivirus security
Antivirus security
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Welcome to my presentation
Welcome to my presentationWelcome to my presentation
Welcome to my presentation
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Virus
Virus  Virus
Virus
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

Dernier

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 

Dernier (11)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 

Computer Virus powerpoint presentation

  • 2.
  • 3.
  • 4. INTRODUCTION TO COMPUTER VIRUS  What is computer virus ?  Types of computer virus?  What a computer virus do?  Sources of Computer Virus Attack.  Prevention from computer virus  Best antivirus software.
  • 5. Virus *A computer virus is a software program with a ability to make copies of itself ,which attacks itself to other applications or files.
  • 6. Types of computer Virus.  There are three types of computer virus Boot virus Program virus Micro virus
  • 7. BOOT VIRUS:  Boot viruses infects the boot records of hard disk and floppy disks. Generally these are considered more dangerous than program viruses.
  • 8. Program Virus  These viruses infect program files, which have extensions such as .COM,.EXE.,SYS.,DLL,.OVL, or .SCR. program files are attractive targets for computer virus because they are widely used and have relativity, simple formats to which viruses can attach themselves.
  • 9. Macro Viruses  These viruses infects data files. For example, Microsoft word document and template files are susceptible to macro virus attacks they spread rapidly as infected documents are shared on networks or downloaded from internet sites.
  • 10. What a computer virus do?  A virus tries to take control of computer system it has infected at the first opportunity availible.it makes copies of itself and also try to carry harmful task written in its program. This process can happen so quickly that the user is not even aware of the presence of a virus in his/her computer.
  • 11. Top 5 Sources of Computer Virus Attack The most potent and vulnerable threat of computer users is virus attacks. Virus attacks hampers important work involved with data and documents. It is imperative for every computer user to be aware about the software and programs that can help to protect the personal computers from attacks. One must take every possible measure in order to keep the computer systems free from virus attacks. The top sources of virus attacks are highlighted below: Downloadable Programs Cracked Software Email Attachments Internet Booting From CD
  • 12. Best antivirus software.  Norton antivirus.  MacAfee virus scan  Kaspersky antivirus
  • 13. Norton antivirus  Norton antivirus is a product of Symantec corporation. Founded in 1982.  Notion check the following program • Boot record s • Programs(at the time you used them) • All local hard drives, • Files download from internet, • Usb(when in use)
  • 14. MacAfee virus scan MacAfee, Inc. is an antivirus software and computer security company headquartered in Santa Clara, California. It markets McAfee Virus Scan and related security products and services, including the Intercept, and Found stone brands. ...
  • 15. Kaspersky ANTIVIRUS  Kaspersky is product of Kaspersky lab,  A Russian computer security company, • Co-founded by Natalya Kaspersky antivirus, do the following things • Invites virus scan by opening the Kaspersky antivirus window.