0% found this document useful (0 votes)
144 views

IT Presentation 1 (Group 4)

A presentation was given on viruses that discussed what viruses are, how they spread, common signs of viruses, a timeline of computer viruses, sources of virus attacks, types of computer viruses including resident, direct action, overwrite, logic bomb, boot sector, and Trojan horse viruses like Chernobyl and Redlof. It also covered antivirus software and techniques used like examining files for known viruses and using signatures to identify new viruses.

Uploaded by

Amina Farooq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views

IT Presentation 1 (Group 4)

A presentation was given on viruses that discussed what viruses are, how they spread, common signs of viruses, a timeline of computer viruses, sources of virus attacks, types of computer viruses including resident, direct action, overwrite, logic bomb, boot sector, and Trojan horse viruses like Chernobyl and Redlof. It also covered antivirus software and techniques used like examining files for known viruses and using signatures to identify new viruses.

Uploaded by

Amina Farooq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

PRESENTATION ON VIRUSES

Course Title: Introduction To Computer


Course code : IT-101
Submission Date: 13th February,2023
Submitted By:
Noor Amna (22020920-017)
Arfa Hussain (22029920-045)
Amina Farooq (22020920-015)
Tajammal Hussain (22020920-048)
Ayesha Riaz (22020920-034)
Presented by
AYESHA RIAZ
ROLL NO 034

Topic
 Virus
 Introduction of virus
 How does a virus spreads
 Symptoms of virus
 Computer virus timelines
 Types of computer virus
 Sources of computer virus spread
 Antiviruses
 Prevention
 Conclusion
Virus

• A piece of code that is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.
• If this replication succeeds, the affected areas are then said to b ‘’affected’’ with a
computer virus, a metaphor derived from biological viruses.
• Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage. A key thing to know about computer viruses is that they
are designed to spread across programs and systems. Computer viruses typically attach
to an executable host file ,which results in their viral codes executing when a file is
attached to via networks, drives, file sharing programs, or infected email attachments.
• Common signs computer viruses
• Speed of system
• A computer system running slower than usual is one of the most common signs that the device has a virus.
• Pop –up windows
• Unwanted pop up windows appearing on a computer or in a web browser are a telltale sig msn of a computer virus.
• Programs self executing
• If computer programs unexpectedly close by themselves , then it is highly likely that the software has been infected with some form of virus or malware.
•  
• Accounts being logged out
• Some viruses are designed to affect specific applications, which will either cause them to crash or force the ser to automatically log out of the service.
• Crashing of the device
• System crashes and the computer itself unexpectedly closing down are common indicators of virus. Computer viruses cause computers to act in a variety of strange ways, which may
include opening files by themselves , displaying unusual error messages, or clicking keys are random.
• Mass emails being sent from your email account
• Computer viruses are commonly spread via email. Hackers can use other people’s email accounts to spread malware and carry out wider cyberattacks.
• Changes to your homepage
• An unexpected changes to computer---such as your systems homepage being amended or any brower settings being updated –are signs that a computer virus is present on the device.
• How does a computer virus spread or attacks?
• In the early days of computers, viruses were spread between devices using floppy disks. Nowadays viruses can still be heard via hard disks and Universal Serial Bus
devices, but they are more likely to be passed between devices through the internet.
•  
• Computer viruses can be spread via email, with some even capable of hijacking email software to spread themselves. Others may attach to legitimate software , within
software packs, or infect code, and other viruses can be downloaded from compromised application stores and infected code repositories. A key feature of computer
virus is it requires a victim to execute its code or payload, which means the host application should be running.
• Computer virus timeline
• 1949
• Theories for self relicating programs are first developed.
• 1981
• Apple viruses 1, 2, and 3 are some of the first viruses ‘’in the wild’’, or in the public domain.
• 1983
• Fred cohen, while working on his dissertation, formally defines a computer virus as ‘’a computer program that can
affect their computer programs by modifying them in such a way as to include a possibly evolved copy of itself.
• 1986
• Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with
their on code designed to infect each 360kb floppy accessed on any drvie.
• 1987
• The leighs virus, one of the first file viruses, infects command.com files.
• 1988
• One of the most common viruses, Jerusalam, is unleased. Activated every Friday the 13 th, the virus affects
both .exe. And .com files and deletes any programs run on that day.
• MacMag and the Score virus cause the major Macintosh outbreaks.
• ...
SOURCES OF COMPUTER
VIRUS ATTACK

Noor Amna
22020920-017
The most potent and vulnerable threat
of computer users is virus attacks. Virus
attacks hampers important work involved
with data and documents. It is imperative
for every computer users to be aware
about the software and programs that
can help to protect the personal
computer from attacks.
Top sources of virus attack:
The top sources of virus attacks are highlighted below:
Downloading programs: Programs that contains the
downloadable files are the commonest sources of
malware such as freeware, worms and other executable
files. Whether you download an image editing software,
a music file or an e-book, it is important to ensure the
reliability of the source of the media. Unknown, new or
less popular sources should be avoided.
Pirated or cracked software: Every time you open a
cracked software , your antivirus software might flag it
as a malware as the cracks consist of malicious scripts.
Always say “NO” to cracks as they can inject malicious
scripts into your PC .
Email Attachments: Anyone can send you an
email Attachment whether you know them or not.
Clicking on unknown links or attachments can
harm your device. Think twice before clicking
anything and make sure that file type is not ‘exe’.
Internet: One of the easiest way to get a virus on
your device is through the internet . Make sure to
check URL before accessing any website. For a
secured URL always look for ‘https’ in it. For
example, when you click videos published on social
media websites, they may require you to install a
particular type of plug-in to watch that video. But
in reality, these plug-ins might be malicious
software that can steal your sensitive information.
Booting Data from unknown CDs: A malicious software
can get into your device through an unknown CD. A good
practice to be safe from malicious infection is to remove CD
when your device is not working at all. Your system could
reboot the CD if it is not removed before switching off the
computer.
Bluetooth: Bluetooth transfers can also infect your system,
so it is crucial to know what type of media file is being sent
to your computer whenever a transfer takes place. An
effective armor would be to allow Bluetooth connectivity
with the known devices and activate it when required.
Unpatched software: Often overlooked, unpatched
software is also a leading sources of virus infection. Security
holes in a software are exploited by attackers and are
unknown to software makers until the attackers release
them in the form of zero-day attacks. It is therefore
recommended to install software updates as soon as they
Types of
Computer
Viruses

Presented By:
Arfa Hussain Butt
22020920-045
Types of Computer Viruses:
• Resident.
• Direct Action.
• Overwrite.
• Logic Bomb.
• Boot Sector.
• Trojan Horse.
• Chernobal Virus
• Redlof
Resident & Direct Action:
• Resident: Resident virus is a virus which saves itself in the
memory of the computer and can easily infect other files
because it is hidden in the memory and is hard to be
removed from the system.

• Direct Action: when a virus attaches itself directly to .exe


or .com file and enters a device while its execution is called
direct action virus. If it gets installed in the memory, it keeps
itself hidden. It is also known as non-resident virus.
Over write & Logic Bomb
• Overwrite: It is one of the most harmful virus, it can completely
remove the existing program and replace it with the malicious code
by overwriting it. Gradually it can completely replace the host's
programming code with the harmful code.

• Logic bomb: It is a virus activates when certain conditions are met


such as opening a file or when certain date and time occurs etc. it is
also called time bomb. Michelangelo is an example of logic bomb.it
destroys data on the hard disk on March 06.
Boot Sector & Trojan Horse
• Boot sector:One of the easier viruses to avoid, this virus hides out in
a files like .exe, ,.com, .dll , on a USB drive or email attachment. When
activated, it can infect the system’s master boot record to damage the
system.

• Trojan Horse: Trojan Horse hides itself as useful program. It


contains hidden instructions to erase data or cause other damage. It
executes illegal, destructive instructions in the middle of a program
such as computer game. FormatC is an example of Trojan Horse.
Chernobal & Redlof
• Chernobal Virus: the famous chernobal virus delete all Microsoft
office files. It also deletes the partition information from the disk that
causes a major loss of data. It also corrupts the system’s BIOS.

• Redlof: Redlof is a polymorphic virus. It is written in Visual Basic


Script. It relies on the Microsoft ActiveX Component to execute itself.
It locates Folders.htt and infects that file. Folder.htt is part of
Microsoft Windows Active Desktop feature.
Anti Viruses
And
Best Anti Virus Software

Presented By: Amina Farooq


Roll No : 22020920-
015
Anti viruses

• Anti virus software consists of computer programs that attempt to


identify and eliminate computer viruses and other malicious
software(mal -ware).

• Antivirus software typically uses two different technique to accomplish


this.

• Examining (scanning) files to look for known viruses matching


definitions in a virus dictionary.

• Most commercial antivirus software uses both of these approaches,


with an emphasis on the virus dictionary approach.

• Identifying suspicious behavior from any computer program which


might indicate infection. Such analysis may include data captures, port
monitoring and other methods.
What is an Anti- Virus?
• Anti- virus is a software (computer program) that scans files or your computer’s
memory for certain patterns that may indicate an infection. The patterns if looks
for based on the signatures or fingerprints of known viruses. Once a virus is
detected in the wild, the Anti- virus companies then release these new patterns
for your Anti- virus software to use. Virus authors are continuously releasing new
and updated viruses, so it is important that you have the latest definitions
installed on your computer.

• Once you have installed an anti- virus package, you should scan your entire
computer periodically. Always leave your anti – virus software running so it can
provide constant protection.
Types Of Anti- Virus Product

• Depending on the installation method of the Anti- virus these can be in the
following forms: On- Access, On- Demand and hardware.

• On- access scanners check for viruses files or floppy disks are “accessed”. They
are designed to run transparently in the background. When well implemented they
should be invisible to the user they shouldn’t even realize they are running an anti-
virus product until it interprets a virus. It has been our experience that on-access
scanners are the most popular type of anti- virus product.

• On- demand scanners only execute when the user tells them to execute. In other
words they only scan the floppy disk they have just inserted. The drawback with
this method is that users have to remember to scan files and disks for viruses.
• Hardware anti- virus products tend to be unpopular. The reason for this is
that it is considerably harder to install a hardware card into many hundreds of
PCs than it is to install computer software. Further more difficulties may
arise if the hardware antivirus needs to be updated a deal with new threats
(macro virus for example).

• Depending on the way they fix viruses these can be in the following forms:
Anti- virus, Anti- spyware and Anti- spam Applications.
How does an Anti- Virus works?
• Anti- virus applications maintain a database of known viruses and compare
scanned files that match the characteristics of known viruses. If a scanned
files matches those characteristics of known viruses, it id quarantined ( which
means moved to a new, safe location on disk and renamed, so you can find it
when you need it) so that it can’t affect other files on your system.

• Signature detection is just one way of identifying viruses and is only


effective if the virus database is up-to-date and contains the signature of a
virus. Anti-virus programs also attempt to identify suspicious behavior
include an application attempting to write to an executive file, alternating
needed system files, making suspicious registry entrees or adding to the list of
items that execute automatically upon system start up.
• Once the file is quarantined, the
application can attempt to repair it, delete
it or prompt you for a decision on what to
do about the infected file.

• This approach helps protect to protect


against unidentified or encrypted viruses
and can also alert you to suspicious
behavior happening on your computer.
This interesting is an area where Anti-
spyware/ Anti-adware and anti-virus
software often notice the same kinds of
activities, because they are typical for
adware and spyware as well as malware.
Why didn’t my anti –virus
software work?

• It’s important to keep your antivirus


current with the latest updates( usually
called definition files) that help the tool
identify and remove the latest threats.

• In addition, not all antivirus tools are the


same, if you find that the one you use isn’t
working to your satisfaction, you should
do some research and try an alternative.
How do I install updates
and antivirus software if I

can’t use my computer??

• It might be difficult to
download tools or update
your computer if your
computer has a virus. In this
case, use a friend’s or other
computer to download the
tools to a disk.
Dictionary Approach

•In the virus dictionary approach, when the antivirus


software looks at a file, it refers to a dictionary of known
viruses that the authors of the antivirus software have
identified. If a piece of code in the file matches any virus
identified in the dictionary, then the antivirus software
can take one of the following action:

• Attempt to repair the file by removing virus itself from


the file.

• Quarantine the file ( such that the file remains


inaccessible to the other program and its virus can no
longer spread).

• Delete the infected file.


Dictionary Approach

Dictionary based antivirus software typically examines files when


computer’s operating system create, opens, closes or emails them. In
this way it can detect a known virus immediately upon receipt. Note
too that q System Administrator can typically schedule the antivirus
software to examine (scan) all files on the computer’s hard disk at a
regular basis.
In Summary
• If it sound to good to be true…..It
probably is!

• Never let your guard down!

• Treat your password like a


toothbrush…..
change it every 3 months and don’t
let anyone else use it..!!!

• Don’t be nervous….Just aware!!


Prevention and
conclusion of
computer
viruses
Presented By:
Tajammal Hussain
22020920-048
Preservation of computer viruses
 How to help to prevent computer viruses:
• Nothing can guarantee your computer’s security from computer viruses to
100 percent.
• You can continue to improve your computer’s security and decrease the
possibility of infection by using a firewall, keeping your system up-to-date,
maintaining a current antivirus software subscription, and following a few
best practices

 How to remove a computer virus:


• Even for an expert, removing a virus from a computer can be a difficult task
without the help of tools designed for the job.
• Some viruses and other unwanted software reinstall themselves after they
have been detected and removed.
• Fortunately, by updating your computer and using free trial-period, or low-
cost antivirus tools, you can help permanently remove and avoid unwanted
softwares.
Steps to help remove a virus:

 Points:
1. Visit Microsoft Updates and install the latest updates of
windows on your pc or laptop.
2. If you currently use antivirus software, visit the
manufacturer’s website, update your software, and then
perform a thorough scan of your computer. If you don’t use
antivirus software, subscribe to a paid service on the
internet and scan your computer immediately.
3. Download, install and run the Malicious Software Remove
Tool for Windows XP or Windows 2000 users. Note that this
tool does not prevent viruses from infecting your system, it
helps to remove existing viruses.
Steps to help avoid viruses
Points:
Use an Internet firewall in windows by installing it
except Window XP and SP2 which has already firewall by
default.
1. Visit Microsoft Update and turn on automatic
updating.
2. If you’ve installed Office 2003 or Office XP, Automatic
Updates will also update your office programs.
3. If you have an earlier version of Office, use Office
Updates.
4. Subscribe to industry standard antivirus software,
such as Windows Live One Care and keep it current.
Never open an e-mail attachment from someone you
don’t know.
5. Avoid opening an e-mail attachment from someone
you don’t know, unless you know exactly what the
attachment is. The sender may be unaware that it
contain a virus
Virus Prevention
• Point:
 Don’t automatically open email and other email
attachments.
• Immediately delete emails from unknown sources.
 Avoiding downloading files that you can’t be sure
are safe.
• Free games, screen savers, desktop, etc.
 When in doubt, Error on the side of caution..
 Virus Software:
• If you don’t have it, Get it!!
1. Norton Antivirus.
2. McAfee Virus Shield.
3. BitDefender.
• Keep your virus software updated.
• Verify that it your virus software is working.
Conclusion of computer virus
• Virus basically destroys our system due to which our efficient information is also lost and
multiple copies of your same data is stored due to which more pressure is put on the
computer, so we should always keep our firewall and antivirus updated
• There are lots of viruses in the world and new viruses are coming up every day. There are new
antivirus programs and technologies developed too. It is good to be aware of viruses and
other malware and it is cheaper to protect you environment from them rather than being
sorry.
• There might be a virus in your computer if it starts acting differently. There is no reason to
panic if the computer virus is found.
• It is good to be a little suspicious of malware when you surf in the internet and download files.
Some files that look interesting might hide a malware.
• A computer virus is a program that reproduces itself and its mission is to spread out. Most
viruses are harmless and some viruses might causes random damage to data files.
• A trojan horse is not a virus because it does not reproduce. The trojan horse are usually
masked so that they look interesting. There are the trojan horses that steel secret passwords
and formats hard disks.
• Some peoples wants to experiment how to write
viruses and test their programming talent. At the
same time they do not understand about the
consequences for other people or they simply do
not care.
• Viruses mission is to hop from program to other
and this can happen via floppy disks, internet FTP
sites, newsgroups and via email attachments.
Viruses are mostly written for Pc-computers and
DOS environments.
• Viruses are not any more something that just
programmers and computer specialist have to deal
with. Today everyday users have to deal with
viruses
Thanks
for
watching

You might also like