SlideShare a Scribd company logo
1 of 17
VIRUS , ANTIVIRUS & FIREWALL
 Group Members:
 Somesh Mahale
 Tejas Patil
 Harshal Joshi
 Samiran Amrutsagar
 Umesh More
VIRUS
• Computer viruses are small software
programs designed to transfer from one
computer to another.
“A virus is simply a computer program that is
intentionally written to attach itself to other
programs and replicate whenever those
programs are executed ”.
• Viruses can easily spread by e-mail
attachment or instant messaging messages.
• Virus can be spread by downloading
unnecessary files from Internet.
• Viruses can be disguised as attachments of
funny images, greeting cards, or audio and
video files.
HISTORY
 The creeper virus was first detected on ARPANET, in
early 1970s
 Propagated from TENEX operating system.
 The first pc virus was a boot sector virus called “brain”,
created by Basit and Amjad Farooq Alvi, in 1986,
Lahore, Pakistan.
 This virus copies itself from the software.
TRADITIONAL COMPUTER VIRUSES
 First widely seen in the late 1980s,
 Technology development encouraged virus
creation.
 Development of personal computers.
 Due to the internet.
 Development of floppy disks.
HOW VIRUS WORKS?
 When we run infected program it loads into
the memory and stars running as well. It
also has an ability to infect other programs.
 When virus runs unidentified programs it
adds itself to it.
 When we transfer some programs and files
to our friend either through email, cd, and
floppy disk, our friend’s computer can also
be affected as well.
TYPE
 Trojan horses –
A Trojan horse is a simple computer program.
The program damage when we run it. It can even
damage hard disk. Trojan horses can’t replicate
automatically.
 E-mail viruses –
An e-mail virus travels as an attachment to email-
message and usually replicates itself by
automatically mailing itself to the entire contact list
on our email address book. Some e-mail viruses
don't even require a double- click. If we hit once, it
directly passes to system.
SAFETY MEASURES FOR VIRUSES
 Run a secure operating system like UNIX.
 Buy virus protection software and install in PCs.
 Avoid program from unknown sources (INTERNET).
 Use commercial software.
 For Microsoft application, Macro Virus Protection
should be enabled.
 Never download unknown email attachment.
 Block receiving and sending executable codes.
 Solution is Antivirus software
ANTIVIRUS-SOFTWARE
 Softwares that attempt to identify and eliminate
computer viruses and other malicious software
(malware).
 Sophisticated - But virus creators are always one
step ahead.
 Detection - This is the key to antivirus software.
DETECTION TECHNIQUES
 Scanning
 Integrity Checking
 Scanning is the most commonly used technique in
antivirus software.
SCANNING
 Also known as Virus Dictionary Approach.
 Scanner scans the hard disk, memory, boot sector
for code snippets.
 If code snippet in a file matches any virus in the
dictionary, appropriate action is taken.
SCANNING
 Advantages
- Viruses can be found before execution.
- False alarms are rare.
- Quick at detecting known viruses.
 Disadvantages
- Polymorphic Viruses.
- Virus executes at least once.
- Continuous updates necessary.
What is a firewall?
A firewall is a device (or software
feature) designed to control the flow of
traffic into and out-of a network.
In general, firewalls are installed to
prevent attacks.
Edge Firewall
An edge firewall is usually software running on a
server or workstation. An edge firewall protects a
single computer from attacks directed against it.
Examples of these firewalls are:
ZoneAlarm
BlackIce
IPFW on OSX
Firewall Appliance
An appliance firewall is a device
whose sole function is to act as a
firewall. Examples of these firewalls
are:
Cisco PIX.
Netscreen series.
Router/Bridge based Firewall
A firewall running on a bridge or a router protects from a
group of devices to an entire network. Cisco has firewall
feature sets in their IOS operating system.
Computer-based Network Firewall
A network firewall runs on a computer (such as a PC or
Unix computer). These firewalls are some of the most
flexible. Many free products are available including
IPFilter (the first package we tried), PF (the current
package we are using found on OpenBSD 3.0 and later)
and IPTables (found on Linux). Commercial products
include: Checkpoint Firewall-1. Apple OSX includes
IPFW (included in an operating system you gotta
purchase).
Network Firewall
Protect a wide range of machines
from general probes and many
attacks.
Provides some protection for
machines lacking in security.
Why use a firewall ?
Blocks packets based on:
Source IP Address or range of addresses.
Source IP Port
Destination IP Address or range of addresses.
Destination IP Port
Some allow higher layers up the OSI model.
Other protocols (How would you filter DecNET anyway?).
Common ports
80 HTTP
443 HTTPS
20 & 21 FTP (didn’t know 20 was for FTP, did you?)
23 Telnet
22 SSH
25 SMTP

More Related Content

What's hot

information about virus
information about virusinformation about virus
information about virustoshan badiye
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02hiiraa
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Neeraj Bhandari
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Dasun Hegoda
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaILAKIA
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 

What's hot (20)

information about virus
information about virusinformation about virus
information about virus
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02Computervirus 110705112128-phpapp02
Computervirus 110705112128-phpapp02
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
Computer Virus by Neeraj Bhandari ( Surkhet.Nepal )
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Virus
VirusVirus
Virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
computer Virus
computer Virus computer Virus
computer Virus
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Virus
VirusVirus
Virus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Viewers also liked

CQ5 QueryBuilder - .adaptTo(Berlin) 2011
CQ5 QueryBuilder - .adaptTo(Berlin) 2011CQ5 QueryBuilder - .adaptTo(Berlin) 2011
CQ5 QueryBuilder - .adaptTo(Berlin) 2011Alexander Klimetschek
 
Query Analyser , SQL Server Groups, Transact –SQL
Query Analyser , SQL Server Groups, Transact –SQLQuery Analyser , SQL Server Groups, Transact –SQL
Query Analyser , SQL Server Groups, Transact –SQLKomal Batra
 
Addmi 10-query builder
Addmi 10-query  builderAddmi 10-query  builder
Addmi 10-query builderodanyboy
 
Addmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-groupingAddmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-groupingodanyboy
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationbhavana sharma
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationanilaja
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
The Digestive System Powerpoint
The Digestive System   PowerpointThe Digestive System   Powerpoint
The Digestive System Powerpointangellacx
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Viewers also liked (20)

Leadership
LeadershipLeadership
Leadership
 
CQ5 QueryBuilder - .adaptTo(Berlin) 2011
CQ5 QueryBuilder - .adaptTo(Berlin) 2011CQ5 QueryBuilder - .adaptTo(Berlin) 2011
CQ5 QueryBuilder - .adaptTo(Berlin) 2011
 
Quiery builder
Quiery builderQuiery builder
Quiery builder
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Query Analyser , SQL Server Groups, Transact –SQL
Query Analyser , SQL Server Groups, Transact –SQLQuery Analyser , SQL Server Groups, Transact –SQL
Query Analyser , SQL Server Groups, Transact –SQL
 
Ia
IaIa
Ia
 
Addmi 10-query builder
Addmi 10-query  builderAddmi 10-query  builder
Addmi 10-query builder
 
Addmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-groupingAddmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-grouping
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Dell cod.scr--
Dell cod.scr--Dell cod.scr--
Dell cod.scr--
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
The Digestive System Powerpoint
The Digestive System   PowerpointThe Digestive System   Powerpoint
The Digestive System Powerpoint
 
The Digestive System
The Digestive SystemThe Digestive System
The Digestive System
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Similar to Virus and antivirus

computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................vndoon
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1wargames12
 

Similar to Virus and antivirus (20)

Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer Viruses...................................................
Computer Viruses...................................................Computer Viruses...................................................
Computer Viruses...................................................
 
Virus project
Virus projectVirus project
Virus project
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer virus 1
Computer virus 1Computer virus 1
Computer virus 1
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

Recently uploaded

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Virus and antivirus

  • 1. VIRUS , ANTIVIRUS & FIREWALL  Group Members:  Somesh Mahale  Tejas Patil  Harshal Joshi  Samiran Amrutsagar  Umesh More
  • 2. VIRUS • Computer viruses are small software programs designed to transfer from one computer to another. “A virus is simply a computer program that is intentionally written to attach itself to other programs and replicate whenever those programs are executed ”. • Viruses can easily spread by e-mail attachment or instant messaging messages. • Virus can be spread by downloading unnecessary files from Internet. • Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
  • 3. HISTORY  The creeper virus was first detected on ARPANET, in early 1970s  Propagated from TENEX operating system.  The first pc virus was a boot sector virus called “brain”, created by Basit and Amjad Farooq Alvi, in 1986, Lahore, Pakistan.  This virus copies itself from the software.
  • 4. TRADITIONAL COMPUTER VIRUSES  First widely seen in the late 1980s,  Technology development encouraged virus creation.  Development of personal computers.  Due to the internet.  Development of floppy disks.
  • 5. HOW VIRUS WORKS?  When we run infected program it loads into the memory and stars running as well. It also has an ability to infect other programs.  When virus runs unidentified programs it adds itself to it.  When we transfer some programs and files to our friend either through email, cd, and floppy disk, our friend’s computer can also be affected as well.
  • 6. TYPE  Trojan horses – A Trojan horse is a simple computer program. The program damage when we run it. It can even damage hard disk. Trojan horses can’t replicate automatically.  E-mail viruses – An e-mail virus travels as an attachment to email- message and usually replicates itself by automatically mailing itself to the entire contact list on our email address book. Some e-mail viruses don't even require a double- click. If we hit once, it directly passes to system.
  • 7. SAFETY MEASURES FOR VIRUSES  Run a secure operating system like UNIX.  Buy virus protection software and install in PCs.  Avoid program from unknown sources (INTERNET).  Use commercial software.  For Microsoft application, Macro Virus Protection should be enabled.  Never download unknown email attachment.  Block receiving and sending executable codes.  Solution is Antivirus software
  • 8. ANTIVIRUS-SOFTWARE  Softwares that attempt to identify and eliminate computer viruses and other malicious software (malware).  Sophisticated - But virus creators are always one step ahead.  Detection - This is the key to antivirus software.
  • 9. DETECTION TECHNIQUES  Scanning  Integrity Checking  Scanning is the most commonly used technique in antivirus software.
  • 10. SCANNING  Also known as Virus Dictionary Approach.  Scanner scans the hard disk, memory, boot sector for code snippets.  If code snippet in a file matches any virus in the dictionary, appropriate action is taken.
  • 11. SCANNING  Advantages - Viruses can be found before execution. - False alarms are rare. - Quick at detecting known viruses.  Disadvantages - Polymorphic Viruses. - Virus executes at least once. - Continuous updates necessary.
  • 12. What is a firewall? A firewall is a device (or software feature) designed to control the flow of traffic into and out-of a network. In general, firewalls are installed to prevent attacks.
  • 13. Edge Firewall An edge firewall is usually software running on a server or workstation. An edge firewall protects a single computer from attacks directed against it. Examples of these firewalls are: ZoneAlarm BlackIce IPFW on OSX
  • 14. Firewall Appliance An appliance firewall is a device whose sole function is to act as a firewall. Examples of these firewalls are: Cisco PIX. Netscreen series.
  • 15. Router/Bridge based Firewall A firewall running on a bridge or a router protects from a group of devices to an entire network. Cisco has firewall feature sets in their IOS operating system. Computer-based Network Firewall A network firewall runs on a computer (such as a PC or Unix computer). These firewalls are some of the most flexible. Many free products are available including IPFilter (the first package we tried), PF (the current package we are using found on OpenBSD 3.0 and later) and IPTables (found on Linux). Commercial products include: Checkpoint Firewall-1. Apple OSX includes IPFW (included in an operating system you gotta purchase). Network Firewall
  • 16. Protect a wide range of machines from general probes and many attacks. Provides some protection for machines lacking in security. Why use a firewall ?
  • 17. Blocks packets based on: Source IP Address or range of addresses. Source IP Port Destination IP Address or range of addresses. Destination IP Port Some allow higher layers up the OSI model. Other protocols (How would you filter DecNET anyway?). Common ports 80 HTTP 443 HTTPS 20 & 21 FTP (didn’t know 20 was for FTP, did you?) 23 Telnet 22 SSH 25 SMTP