1 / 0

What are computer viruses and its types?

What are computer viruses and its types? . Computer Viruses are malicious software programs that damage computer program entering into the computer without the permission of the users, and also run against the wishes of the users. . Viruses, worms, Trojans.

talasi
Télécharger la présentation

What are computer viruses and its types?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What are computer viruses and its types?

    Computer Viruses are malicious software programs that damage computer program entering into the computer without the permission of the users, and also run against the wishes of the users.
  2. Viruses, worms, Trojans Viruses, worms, Trojans, spyware, and bots are all part of a class of software called malware(malicious software) . It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks. Damage from malware varies from causing minor irritation (such as browser popup ads), to stealing confidential information or money, destroying data, and compromising and/or entirely disabling systems and networks.
  3. Two Important Classes of Malware:VIRUSES and WORMS These types of programs are able to self-replicate and can spread copies of themselves, which might even be modified copies VIRUSES: A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.
  4. Contd… WORMS:Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. TROJANS:A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user interaction such as opening an e-mail attachment or downloading and running a file from the Internet.
  5. What to do in this malicious world of viruses? Keep your computer’s OS up to date. You should have Updated Antivirus Software Installed (e.gKespersky, Quick Heal etc). You may also want to consider installing a firewall.
  6. FIREWALLS A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
  7. Computing Ethics and Cyber Crime Computer ethics is a set of moral principles that regulate the use of computers. Some of the computing ethics are to not use a computer to harm other people or to steal. It also intends to help in the prevention of cyber crime. Cyber crime is criminal activity done using computers and the internet. It is considered to be one of the fastest growing areas in crime Identity Theft. Stealing money from online bank accounts. Creating and distributing viruses. Internet use by terrorists(National/International security.
  8. What are crackers and hackers? A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things. Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems. These hackers are also known as white hat hackers.
  9. Thanks … Have A Nice Day…
More Related