IT Presentation 1 (Group 4)
IT Presentation 1 (Group 4)
Topic
Virus
Introduction of virus
How does a virus spreads
Symptoms of virus
Computer virus timelines
Types of computer virus
Sources of computer virus spread
Antiviruses
Prevention
Conclusion
Virus
• A piece of code that is capable of copying itself and typically has a detrimental
effect, such as corrupting the system or destroying data.
• If this replication succeeds, the affected areas are then said to b ‘’affected’’ with a
computer virus, a metaphor derived from biological viruses.
• Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss and leakage. A key thing to know about computer viruses is that they
are designed to spread across programs and systems. Computer viruses typically attach
to an executable host file ,which results in their viral codes executing when a file is
attached to via networks, drives, file sharing programs, or infected email attachments.
• Common signs computer viruses
• Speed of system
• A computer system running slower than usual is one of the most common signs that the device has a virus.
• Pop –up windows
• Unwanted pop up windows appearing on a computer or in a web browser are a telltale sig msn of a computer virus.
• Programs self executing
• If computer programs unexpectedly close by themselves , then it is highly likely that the software has been infected with some form of virus or malware.
•
• Accounts being logged out
• Some viruses are designed to affect specific applications, which will either cause them to crash or force the ser to automatically log out of the service.
• Crashing of the device
• System crashes and the computer itself unexpectedly closing down are common indicators of virus. Computer viruses cause computers to act in a variety of strange ways, which may
include opening files by themselves , displaying unusual error messages, or clicking keys are random.
• Mass emails being sent from your email account
• Computer viruses are commonly spread via email. Hackers can use other people’s email accounts to spread malware and carry out wider cyberattacks.
• Changes to your homepage
• An unexpected changes to computer---such as your systems homepage being amended or any brower settings being updated –are signs that a computer virus is present on the device.
• How does a computer virus spread or attacks?
• In the early days of computers, viruses were spread between devices using floppy disks. Nowadays viruses can still be heard via hard disks and Universal Serial Bus
devices, but they are more likely to be passed between devices through the internet.
•
• Computer viruses can be spread via email, with some even capable of hijacking email software to spread themselves. Others may attach to legitimate software , within
software packs, or infect code, and other viruses can be downloaded from compromised application stores and infected code repositories. A key feature of computer
virus is it requires a victim to execute its code or payload, which means the host application should be running.
• Computer virus timeline
• 1949
• Theories for self relicating programs are first developed.
• 1981
• Apple viruses 1, 2, and 3 are some of the first viruses ‘’in the wild’’, or in the public domain.
• 1983
• Fred cohen, while working on his dissertation, formally defines a computer virus as ‘’a computer program that can
affect their computer programs by modifying them in such a way as to include a possibly evolved copy of itself.
• 1986
• Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with
their on code designed to infect each 360kb floppy accessed on any drvie.
• 1987
• The leighs virus, one of the first file viruses, infects command.com files.
• 1988
• One of the most common viruses, Jerusalam, is unleased. Activated every Friday the 13 th, the virus affects
both .exe. And .com files and deletes any programs run on that day.
• MacMag and the Score virus cause the major Macintosh outbreaks.
• ...
SOURCES OF COMPUTER
VIRUS ATTACK
Noor Amna
22020920-017
The most potent and vulnerable threat
of computer users is virus attacks. Virus
attacks hampers important work involved
with data and documents. It is imperative
for every computer users to be aware
about the software and programs that
can help to protect the personal
computer from attacks.
Top sources of virus attack:
The top sources of virus attacks are highlighted below:
Downloading programs: Programs that contains the
downloadable files are the commonest sources of
malware such as freeware, worms and other executable
files. Whether you download an image editing software,
a music file or an e-book, it is important to ensure the
reliability of the source of the media. Unknown, new or
less popular sources should be avoided.
Pirated or cracked software: Every time you open a
cracked software , your antivirus software might flag it
as a malware as the cracks consist of malicious scripts.
Always say “NO” to cracks as they can inject malicious
scripts into your PC .
Email Attachments: Anyone can send you an
email Attachment whether you know them or not.
Clicking on unknown links or attachments can
harm your device. Think twice before clicking
anything and make sure that file type is not ‘exe’.
Internet: One of the easiest way to get a virus on
your device is through the internet . Make sure to
check URL before accessing any website. For a
secured URL always look for ‘https’ in it. For
example, when you click videos published on social
media websites, they may require you to install a
particular type of plug-in to watch that video. But
in reality, these plug-ins might be malicious
software that can steal your sensitive information.
Booting Data from unknown CDs: A malicious software
can get into your device through an unknown CD. A good
practice to be safe from malicious infection is to remove CD
when your device is not working at all. Your system could
reboot the CD if it is not removed before switching off the
computer.
Bluetooth: Bluetooth transfers can also infect your system,
so it is crucial to know what type of media file is being sent
to your computer whenever a transfer takes place. An
effective armor would be to allow Bluetooth connectivity
with the known devices and activate it when required.
Unpatched software: Often overlooked, unpatched
software is also a leading sources of virus infection. Security
holes in a software are exploited by attackers and are
unknown to software makers until the attackers release
them in the form of zero-day attacks. It is therefore
recommended to install software updates as soon as they
Types of
Computer
Viruses
Presented By:
Arfa Hussain Butt
22020920-045
Types of Computer Viruses:
• Resident.
• Direct Action.
• Overwrite.
• Logic Bomb.
• Boot Sector.
• Trojan Horse.
• Chernobal Virus
• Redlof
Resident & Direct Action:
• Resident: Resident virus is a virus which saves itself in the
memory of the computer and can easily infect other files
because it is hidden in the memory and is hard to be
removed from the system.
• Once you have installed an anti- virus package, you should scan your entire
computer periodically. Always leave your anti – virus software running so it can
provide constant protection.
Types Of Anti- Virus Product
• Depending on the installation method of the Anti- virus these can be in the
following forms: On- Access, On- Demand and hardware.
• On- access scanners check for viruses files or floppy disks are “accessed”. They
are designed to run transparently in the background. When well implemented they
should be invisible to the user they shouldn’t even realize they are running an anti-
virus product until it interprets a virus. It has been our experience that on-access
scanners are the most popular type of anti- virus product.
• On- demand scanners only execute when the user tells them to execute. In other
words they only scan the floppy disk they have just inserted. The drawback with
this method is that users have to remember to scan files and disks for viruses.
• Hardware anti- virus products tend to be unpopular. The reason for this is
that it is considerably harder to install a hardware card into many hundreds of
PCs than it is to install computer software. Further more difficulties may
arise if the hardware antivirus needs to be updated a deal with new threats
(macro virus for example).
• Depending on the way they fix viruses these can be in the following forms:
Anti- virus, Anti- spyware and Anti- spam Applications.
How does an Anti- Virus works?
• Anti- virus applications maintain a database of known viruses and compare
scanned files that match the characteristics of known viruses. If a scanned
files matches those characteristics of known viruses, it id quarantined ( which
means moved to a new, safe location on disk and renamed, so you can find it
when you need it) so that it can’t affect other files on your system.
• It might be difficult to
download tools or update
your computer if your
computer has a virus. In this
case, use a friend’s or other
computer to download the
tools to a disk.
Dictionary Approach
Points:
1. Visit Microsoft Updates and install the latest updates of
windows on your pc or laptop.
2. If you currently use antivirus software, visit the
manufacturer’s website, update your software, and then
perform a thorough scan of your computer. If you don’t use
antivirus software, subscribe to a paid service on the
internet and scan your computer immediately.
3. Download, install and run the Malicious Software Remove
Tool for Windows XP or Windows 2000 users. Note that this
tool does not prevent viruses from infecting your system, it
helps to remove existing viruses.
Steps to help avoid viruses
Points:
Use an Internet firewall in windows by installing it
except Window XP and SP2 which has already firewall by
default.
1. Visit Microsoft Update and turn on automatic
updating.
2. If you’ve installed Office 2003 or Office XP, Automatic
Updates will also update your office programs.
3. If you have an earlier version of Office, use Office
Updates.
4. Subscribe to industry standard antivirus software,
such as Windows Live One Care and keep it current.
Never open an e-mail attachment from someone you
don’t know.
5. Avoid opening an e-mail attachment from someone
you don’t know, unless you know exactly what the
attachment is. The sender may be unaware that it
contain a virus
Virus Prevention
• Point:
Don’t automatically open email and other email
attachments.
• Immediately delete emails from unknown sources.
Avoiding downloading files that you can’t be sure
are safe.
• Free games, screen savers, desktop, etc.
When in doubt, Error on the side of caution..
Virus Software:
• If you don’t have it, Get it!!
1. Norton Antivirus.
2. McAfee Virus Shield.
3. BitDefender.
• Keep your virus software updated.
• Verify that it your virus software is working.
Conclusion of computer virus
• Virus basically destroys our system due to which our efficient information is also lost and
multiple copies of your same data is stored due to which more pressure is put on the
computer, so we should always keep our firewall and antivirus updated
• There are lots of viruses in the world and new viruses are coming up every day. There are new
antivirus programs and technologies developed too. It is good to be aware of viruses and
other malware and it is cheaper to protect you environment from them rather than being
sorry.
• There might be a virus in your computer if it starts acting differently. There is no reason to
panic if the computer virus is found.
• It is good to be a little suspicious of malware when you surf in the internet and download files.
Some files that look interesting might hide a malware.
• A computer virus is a program that reproduces itself and its mission is to spread out. Most
viruses are harmless and some viruses might causes random damage to data files.
• A trojan horse is not a virus because it does not reproduce. The trojan horse are usually
masked so that they look interesting. There are the trojan horses that steel secret passwords
and formats hard disks.
• Some peoples wants to experiment how to write
viruses and test their programming talent. At the
same time they do not understand about the
consequences for other people or they simply do
not care.
• Viruses mission is to hop from program to other
and this can happen via floppy disks, internet FTP
sites, newsgroups and via email attachments.
Viruses are mostly written for Pc-computers and
DOS environments.
• Viruses are not any more something that just
programmers and computer specialist have to deal
with. Today everyday users have to deal with
viruses
Thanks
for
watching