COMPUTER VIRUS
AND
SECURITY
COMPUTER
VIRUS
A COMPUTER VIRUS IS A MALICIOUS
SOFTWARE PROGRAM DESIGNED TO
DISRUPT, DAMAGE, OR GAIN
UNAUTHORIZED ACCESS TO
COMPUTER SYSTEMS.
• Named after biological viruses
due to their ability to replicate
and spread.
• First virus: "Creeper" in the
1970s.
CHARACTERISTICS OF
VIRUS
Computer viruses can replicate
They often remain dormant until
themselves and spread from one file or
specific conditions, such as a date or a
system to another without user
file being opened, are met
intervention.
Once activated, viruses execute Viruses use advanced methods like
harmful actions, such as deleting files, encryption and code obfuscation to
stealing data, or disrupting system avoid being detected by antivirus
operations. software.
TYPES OF VIRUSES
File Infector Virus Boot Sector Virus
Infects the boot sector of a storage
Attach themselves to executable files device.
and spread when the file is run.
Macro Virus
Target macros in applications like
Microsoft Word or Excel.
TYPES OF VIRUSES
Ransomware Trojan Horse
Disguise themselves as legitimate
Encrypts user data and demands programs but perform malicious
payment for its release. activities.
Worms
Self-replicating programs that
spread across networks without
user action.
Signs of Virus Infection
• Slow computer performance.
• Frequent crashes or error messages.
• Unusual pop-ups or advertisements.
• Unauthorized data access or deletion.
METHODS Removable
Media:
OF USB drives
SPREAD and external
hard drives.
Email Infected
Attachments: Downloads:
Software or
Fake messages
media from
containing untrusted
malicious files. sources.
PREVENTIVE
MEASURES
OR
SECURITY
Individual-Level
Security
• Install and update antivirus software.
• Regularly update operating systems
and software.
• Avoid clicking unknown links or
downloading from untrusted sources
Organization-Level
Security
• Use firewalls to monitor
network traffic.
• Train employees about
phishing and cyber threats.
• Regular data backups and
disaster recovery plans.
Advanced Security
Solutions
• Two-Factor Authentication (2FA).
• Virtual Private Network (VPN).
• Encryption for sensitive data.
• Security training for employees.
CASE STUDY
WannaCry Ransomware Attack
• It occurred in 2017, affecting over 200,000 systems globally.
• Exploited a vulnerability in Microsoft Windows.
• Demanded payment in Bitcoin for file decryption.
CONCLUSION
• Stay informed about threats.
• Regularly update and protect systems.
• Adopt safe online practices.
“ An ounce of prevention is worth a pound of
cure."
THANK
YOU