際際滷

際際滷Share a Scribd company logo
OUTLINE
I- Introduction
a) History
b) What is a computer virus?
c) Similarities between computer and biological virus
II- Types of Viruses
1- Boot Sector Virus
2- File Virus
3- Program Virus
III- Sources of Computer Virus Attack
a) Downloadable programs
b) Cracked Software
c) Email attachments
d) Booting from CD
IV- Prevention
a) No drive's sharing
b) Use of anti virus
c) Delete suspicious e-mail attachments
d) More secure O.S. e.g. UNIX
V- Antivirus Software And Their Methods of Detection
a) Antivirus
- Norton antivirus
- Mac Afee virus scan
- Kasperky antivirus
b) Methods of Detection
- Signature-based detection
- Heuristics-based detection
- Behavioral detection
- Cloud-based detection
VI- Conclusion
Why a computer keep sneezing ?
It had a virus !
COMPUTER VIRUSES
I- Introduction
a) History
b) What is a computer virus?
c) Similarities between computer and biological virus
II- Types of viruses
1- Boot Sector Virus
2- File Virus
3- Program Virus
III- Sources of computer virus attack
a) Downloadable programs
b) Cracked Software
c) Email attachments
d) Booting from CD
IV- Prevention
a) No drive sharing
b) Use of anti virus
c) Delete suspicious e-mail attachments
d) More secure O.S. e.g. UNIX
V- Antivirus Software And Their Methods of Detection
a) Antivirus
- Norton antivirus
- Mac Afee virus scan
- Kasperky antivirus
b) Methods of detection
- Signature-based detection
- Heuristics-based detection
- Behavioral detection
- Cloud-based detection
VI- Conclusion
A computer virus is a dangerous program file or piece of code which is written intentionally to
destroy or disrupt the information contained on the disk
It can be prevent or remove from an infected computer using antivirus
Sources
https://en.wikipedia.org/wiki/Fred_Cohen
http://www.tech-faq.com/history-of-computer-viruses.html
http://www.sciencefocus.com/qa/how-do-computer-viruses-work
https://www.livescience.com/32619-how-does-a-virus-infect-your-computer.html
http://searchsecurity.techtarget.com/tip/How-antivirus-software-works-Virus-detection-techniques
Presentation.cv

More Related Content

Similar to Presentation.cv (20)

Team7.ppt
Team7.pptTeam7.ppt
Team7.ppt
leonkrish
digital forensic.docx
digital forensic.docxdigital forensic.docx
digital forensic.docx
TiffanyBryan2
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
UltraUploader
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
SheetalKamble39
Malware
MalwareMalware
Malware
Tuhin_Das
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
Fathoni Mahardika II
Talk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomwareTalk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomware
shubaira
ioThink Security Datasheet
ioThink Security DatasheetioThink Security Datasheet
ioThink Security Datasheet
jingning315
ioThink Security Datasheet
ioThink Security DatasheetioThink Security Datasheet
ioThink Security Datasheet
jingning315
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
Chapter 09
Chapter 09Chapter 09
Chapter 09
Google
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
HHoko1
2266 (1).pdf
2266 (1).pdf2266 (1).pdf
2266 (1).pdf
NewGamer10
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
Sumit Pandey
Mobile security
Mobile securityMobile security
Mobile security
Jagriti Joshi
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
Google
Team7.ppt
Team7.pptTeam7.ppt
Team7.ppt
leonkrish
digital forensic.docx
digital forensic.docxdigital forensic.docx
digital forensic.docx
TiffanyBryan2
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
UltraUploader
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar
Talk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomwareTalk of the hour, the wanna crypt ransomware
Talk of the hour, the wanna crypt ransomware
shubaira
ioThink Security Datasheet
ioThink Security DatasheetioThink Security Datasheet
ioThink Security Datasheet
jingning315
ioThink Security Datasheet
ioThink Security DatasheetioThink Security Datasheet
ioThink Security Datasheet
jingning315
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
Chapter 09
Chapter 09Chapter 09
Chapter 09
Google
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
HHoko1
2266 (1).pdf
2266 (1).pdf2266 (1).pdf
2266 (1).pdf
NewGamer10
NETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSESNETWORK SECURITY AND VIRUSES
NETWORK SECURITY AND VIRUSES
Sumit Pandey
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
Pratimesh Pathak
Web virus activity
Web virus activityWeb virus activity
Web virus activity
Sim_Dhillon
Op Sy 03 Ch 61
Op Sy 03 Ch 61Op Sy 03 Ch 61
Op Sy 03 Ch 61
Google

Recently uploaded (18)

HITRUST Overview and AI Assessments Webinar.pptx
HITRUST Overview and AI Assessments Webinar.pptxHITRUST Overview and AI Assessments Webinar.pptx
HITRUST Overview and AI Assessments Webinar.pptx
AmyPoblete3
BSNL - ( Bharat Sanchar Nigam limited ).
BSNL - ( Bharat Sanchar Nigam limited ).BSNL - ( Bharat Sanchar Nigam limited ).
BSNL - ( Bharat Sanchar Nigam limited ).
VkHits
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx
alvinlibre
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
CartCoders
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov
HITRUST Overview and AI Assessments Webinar.pptx
HITRUST Overview and AI Assessments Webinar.pptxHITRUST Overview and AI Assessments Webinar.pptx
HITRUST Overview and AI Assessments Webinar.pptx
AmyPoblete3
BSNL - ( Bharat Sanchar Nigam limited ).
BSNL - ( Bharat Sanchar Nigam limited ).BSNL - ( Bharat Sanchar Nigam limited ).
BSNL - ( Bharat Sanchar Nigam limited ).
VkHits
IDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger PatchIDM Crack 2025 Internet Download Manger Patch
IDM Crack 2025 Internet Download Manger Patch
wistrendugftr
Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...Introduction on how unique identifier systems are managed and coordinated - R...
Introduction on how unique identifier systems are managed and coordinated - R...
APNIC
cyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online moneycyber hacking and cyber fraud by internet online money
cyber hacking and cyber fraud by internet online money
VEENAKSHI PATHAK
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to beHygiene-and-Sanitation with healthcare and the most important hygiene to be
Hygiene-and-Sanitation with healthcare and the most important hygiene to be
LoveJade1
2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx2a Solving Equations Bar Method.pkdkdmptx
2a Solving Equations Bar Method.pkdkdmptx
alvinlibre
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
Custom Development vs Off-the-Shelf Solutions for Shopify Plus ERP Integratio...
CartCoders
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
Shopify API Integration for Custom Analytics_ Advanced Metrics & Reporting Gu...
CartCoders
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdfKeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
KeepItOn-2024-Internet-Shutdowns-Annual-Report.pdf
sabranghindi
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
JACKPOT TANGKI4D BERMAIN MENGGUNAKAN ID PRO 2025 TEPERCAYA LISENSI STAR GAMIN...
TANGKI4D
Intelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptxIntelligent-Systems-in-Manufacturing.pptx
Intelligent-Systems-in-Manufacturing.pptx
ErickWasonga2
Here are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCPHere are the Top 10 Writers Of 2025 by GLCP
Here are the Top 10 Writers Of 2025 by GLCP
glcppro
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Atta...
IJCNCJournal
A Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beachA Teaching Guide for Those interested in teaching monkey beach
A Teaching Guide for Those interested in teaching monkey beach
sethiserena
IPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's PerspectivesIPv6 - Global and Malaysia's Perspectives
IPv6 - Global and Malaysia's Perspectives
APNIC
phase_4_presentation[1] - Read-Only.pptx Iot
phase_4_presentation[1]  -  Read-Only.pptx Iotphase_4_presentation[1]  -  Read-Only.pptx Iot
phase_4_presentation[1] - Read-Only.pptx Iot
harshithamandya49
QasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartupQasyndaAIFinalVersionPresentationStartup
QasyndaAIFinalVersionPresentationStartup
AidarIsakhanov

Presentation.cv

  • 1. OUTLINE I- Introduction a) History b) What is a computer virus? c) Similarities between computer and biological virus II- Types of Viruses 1- Boot Sector Virus 2- File Virus 3- Program Virus III- Sources of Computer Virus Attack a) Downloadable programs b) Cracked Software c) Email attachments d) Booting from CD
  • 2. IV- Prevention a) No drive's sharing b) Use of anti virus c) Delete suspicious e-mail attachments d) More secure O.S. e.g. UNIX V- Antivirus Software And Their Methods of Detection a) Antivirus - Norton antivirus - Mac Afee virus scan - Kasperky antivirus b) Methods of Detection - Signature-based detection - Heuristics-based detection - Behavioral detection - Cloud-based detection VI- Conclusion
  • 3. Why a computer keep sneezing ? It had a virus !
  • 5. I- Introduction a) History b) What is a computer virus? c) Similarities between computer and biological virus
  • 6. II- Types of viruses 1- Boot Sector Virus 2- File Virus 3- Program Virus
  • 7. III- Sources of computer virus attack a) Downloadable programs b) Cracked Software c) Email attachments d) Booting from CD
  • 8. IV- Prevention a) No drive sharing b) Use of anti virus c) Delete suspicious e-mail attachments d) More secure O.S. e.g. UNIX
  • 9. V- Antivirus Software And Their Methods of Detection a) Antivirus - Norton antivirus - Mac Afee virus scan - Kasperky antivirus b) Methods of detection - Signature-based detection - Heuristics-based detection - Behavioral detection - Cloud-based detection
  • 10. VI- Conclusion A computer virus is a dangerous program file or piece of code which is written intentionally to destroy or disrupt the information contained on the disk It can be prevent or remove from an infected computer using antivirus Sources https://en.wikipedia.org/wiki/Fred_Cohen http://www.tech-faq.com/history-of-computer-viruses.html http://www.sciencefocus.com/qa/how-do-computer-viruses-work https://www.livescience.com/32619-how-does-a-virus-infect-your-computer.html http://searchsecurity.techtarget.com/tip/How-antivirus-software-works-Virus-detection-techniques