0% found this document useful (0 votes)
3 views

Computer viruses Presentation

The document provides an overview of computer viruses, including their definitions, types, effects, and methods of entry into systems. It also discusses how viruses are detected and the role of antivirus software in preventing and removing malware. Key functions of antivirus software, such as real-time protection and virus scanning, are highlighted as essential for maintaining a secure computing environment.

Uploaded by

samiasohail029
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer viruses Presentation

The document provides an overview of computer viruses, including their definitions, types, effects, and methods of entry into systems. It also discusses how viruses are detected and the role of antivirus software in preventing and removing malware. Key functions of antivirus software, such as real-time protection and virus scanning, are highlighted as essential for maintaining a secure computing environment.

Uploaded by

samiasohail029
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Group no#7

Presented By:
Ezzah Sajid.
Eman Saeed.

Faria Asim.
Samia Ashiq.
Madiha Mehak.
Subject:Introduction to ICT
 Computer Viruses
• Definition:
A computer virus is a type of malicious software (malware) designed
to spread from one computer to another and interfere with normal operations.
Viruses can replicate themselves and often require human action (like opening
an infected file) to spread.
• Types of Computer Viruses:
1. File Infector Virus:
Attaches to executable files (.exe, .com).
2. Macro Virus :
Targets documents with macros (e.g., MS Word/Excel).
 Computer Viruses

3. Boot Sector Virus:


Affects the system's boot sector or master boot record.
4. Polymorphic Virus :
Changes its code to evade detection.
5. Resident Virus :
Installs itself in memory and can infect files without user action.
6. Worms and Trojans :
Not true viruses, but often grouped with them; worms self-replicate
without host files, and Trojans disguise as legitimate software.
 Computer Viruses
• Effects of Computer Viruses
1. Data Loss or Corruption:
Viruses can delete or alter important files.
2. System Slowdown:
Malicious code can consume system resources.
3. Unauthorized Access:
Some viruses open backdoors for hackers.
4. Malfunctioning Programs:
Software may crash or behave unpredictably.
 Computer Viruses
• How a Virus Enters a Computer?
Computer viruses can infiltrate a system through various means, often
exploiting user actions or system vulnerabilities:
1. Email Attachments:
Opening infected attachments or clicking malicious links in phishing
emails.
2. Downloading Files from Untrusted Sources:
Free software, pirated content, or fake software updates may contain
viruses.
3. Visiting Malicious Websites:
Some websites automatically download harmful files without user
consent.
 Computer Viruses

4. Infected External Devices:


USB drives, external hard drives, or SD cards can carry viruses.
5. Peer-to-Peer (P2P) Sharing Networks:
Downloading files from torrents or file-sharing platforms.
6. Social Media Links:
Clicking on suspicious or shortened links shared on social media
platforms.
7. Software Vulnerabilities:
Unpatched or outdated software can be exploited by viruses.
 Computer Viruses

• How a Virus Is Detected?


Antivirus software uses several methods to detect viruses:
1. Signature-Based Detection:
Compares files to a database of known virus signatures (unique
codes of malware).
2. Heuristic Analysis:
Examines file behavior or structure to identify new, unknown
viruses that act like known ones.
3. Behavioral Detection:
Monitors real-time system activity to spot suspicious behavior (e.g.,
a program trying to access system files).
 Computer Viruses
4. Sandboxing:
Runs suspicious files in a controlled virtual environment to observe
their behavior.
5. Cloud-Based Detection:
Uses online databases and threat intelligence to quickly detect
emerging threats.
• Conclusion:
Computer viruses pose serious threats to both personal and
organizational systems by compromising data, slowing performance, and
potentially causing financial and privacy losses.
 Anti-Viruses
• Definition:
Antivirus software is a security program designed to detect, prevent, and
remove malware, including viruses, worms, Trojans, and more.
• Common Antivirus Software Examples:
1. Windows Defender (built into Windows).
2. Norton Antivirus.
3. McAfee Antivirus.
4. Avast Antivirus.
5. Kaspersky Antivirus.
6. Bitdefender.
 Anti-Viruses

• Key Functions of Antivirus Software


1. Real-time Protection:
Monitors system activities and files continuously to detect threats as
they occur.
2. Virus Scanning:
Scans the entire system, specific files, or external drives for known
malware signatures.
3. Quarantine and Removal:
Isolates infected files to prevent further damage and provides options
to delete or repair them.
 Anti-Viruses
4. Automatic Updates:
Regularly updates virus definitions to recognize new threats.
5. Email Protection:
Scans incoming/outgoing emails for malicious attachments or links.
6. Web Protection:
Blocks access to known malicious websites and prevents phishing
attacks.
7. Firewall Integration:
Some antivirus suites include firewalls to monitor incoming and
outgoing traffic.
 Anti-Viruses
8. System Optimization:
Many offer tools to clean junk files and optimize system
performance.
• Conclusion:
Antivirus software plays a crucial role in safeguarding devices by
detecting, blocking, and removing these malicious programs. Regular updates,
real-time protection, and safe browsing practices, combined with reliable
antivirus solutions, are essential to maintaining a secure and efficient computing
environment.
ANY QUESTION ?
THANK YOU

You might also like