SlideShare a Scribd company logo
1 of 14
Page 1
VIRUSES AND WORMS




                    Page 2
VIRUS
Viruses are malicious programs that can cause
                damage to computer.
A computer virus attaches itself to a program or
 file enabling it to spread from one computer to
 another leaving infections as it travels. Almost
   all viruses are attached to an executable file
 which means the virus may exist on computer
but it actually infect our systems unless we run
           or open the malicious program.

                                            Page 3
A virus cannot be spread without a
human action (such as running an
infected file or program) to keep it
                going.
A virus is spread by sharing files or
  sending emails with viruses as
     attachments in the email.



                                        Page 4
How they work:
Basic structure:
{
    look for one or more infectable objects
    if (none found)
      exit
    else
      infect object
}
Doesn’t remain in memory, but executes all of
the viral code at once then returns control to the
infected program


                                                     Page 5
Ways to infect computer systems through
viruses.

Boot Sector Penetration
Macros Penetration

Parasites




                                     Page 6
WORMS
A worm is similar to view by design and is
considered to be a sub-class of a virus.
 Worms spread from one computer to another it has
the capability to travel without any human action.
It is an independent program that does not modify
other programs, but reproduces itself over and over
again until it slows down or shuts down a computer
system or network.




                                                Page 7
It uses computer network to spread itself.
It consumes too much system memory
Infects the environment rather than specific
objects
Worms send a copy of itself to everyone
listed on your email address book.
.




                                               Page 8
Difference between viruses and worms.
A virus an worms are similar in that they are both
forms of malicious software. The virus code is
injected into the previously benign program and is
spread when the program is run.
Examples of virus carrier programs are games, e-
mail attachments and animations

A worm is a malicious software which replicates
itself. A worm spreads from system to system
automatically, but virus needs another program in
order to spread.

                                                 Page 9
Characteristics of a Worm

Enhanced Targeting

Enhanced Speed

Enhanced Capabilities

Enhanced Destructive Power



                              Page 10
Phases of a worm or virus operation

Dormant Phase

Propagation Phase

Triggering Phase

Execution Phase




                                      Page 11
Types of viruses
Stealth Virus

Polymorphic Virus

Parasitic Virus

Memory-resident Virus

Boot Sector Virus



                         Page 12
Protecting your Computer System

To ensure that your OS is up-to-date

To have antivirus software and make sure it has
the capability to scan e-mail and files as they are
download from the internet

Need to run full disk scans periodically

Use a Firewall.



                                                      Page 13
Page 14

More Related Content

What's hot

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware
MalwareMalware
Malware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Email threats
Email threatsEmail threats
Email threats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber security cyber security
cyber security
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer security
Computer securityComputer security
Computer security
 
Computer virus
Computer virusComputer virus
Computer virus
 

Viewers also liked (8)

Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Virus and worms

Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
nimmi_abes
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 

Similar to Virus and worms (20)

ethical hacking.pptx
ethical hacking.pptxethical hacking.pptx
ethical hacking.pptx
 
Virus
VirusVirus
Virus
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Sanmi's first pp
Sanmi's first ppSanmi's first pp
Sanmi's first pp
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Virus and worms

  • 3. VIRUS Viruses are malicious programs that can cause damage to computer. A computer virus attaches itself to a program or file enabling it to spread from one computer to another leaving infections as it travels. Almost all viruses are attached to an executable file which means the virus may exist on computer but it actually infect our systems unless we run or open the malicious program. Page 3
  • 4. A virus cannot be spread without a human action (such as running an infected file or program) to keep it going. A virus is spread by sharing files or sending emails with viruses as attachments in the email. Page 4
  • 5. How they work: Basic structure: { look for one or more infectable objects if (none found) exit else infect object } Doesn’t remain in memory, but executes all of the viral code at once then returns control to the infected program Page 5
  • 6. Ways to infect computer systems through viruses. Boot Sector Penetration Macros Penetration Parasites Page 6
  • 7. WORMS A worm is similar to view by design and is considered to be a sub-class of a virus. Worms spread from one computer to another it has the capability to travel without any human action. It is an independent program that does not modify other programs, but reproduces itself over and over again until it slows down or shuts down a computer system or network. Page 7
  • 8. It uses computer network to spread itself. It consumes too much system memory Infects the environment rather than specific objects Worms send a copy of itself to everyone listed on your email address book. . Page 8
  • 9. Difference between viruses and worms. A virus an worms are similar in that they are both forms of malicious software. The virus code is injected into the previously benign program and is spread when the program is run. Examples of virus carrier programs are games, e- mail attachments and animations A worm is a malicious software which replicates itself. A worm spreads from system to system automatically, but virus needs another program in order to spread. Page 9
  • 10. Characteristics of a Worm Enhanced Targeting Enhanced Speed Enhanced Capabilities Enhanced Destructive Power Page 10
  • 11. Phases of a worm or virus operation Dormant Phase Propagation Phase Triggering Phase Execution Phase Page 11
  • 12. Types of viruses Stealth Virus Polymorphic Virus Parasitic Virus Memory-resident Virus Boot Sector Virus Page 12
  • 13. Protecting your Computer System To ensure that your OS is up-to-date To have antivirus software and make sure it has the capability to scan e-mail and files as they are download from the internet Need to run full disk scans periodically Use a Firewall. Page 13