Anda di halaman 1dari 15

SEMINAR

PRESENTATION
ON
COMPUTER
PRESENTED BY:
ANUP KUMAR TIRKEY
ROLL NO :2 ,BCA 2ND YEAR
Full Form of Computer Virus:-

VIRUS Stands for Vital Information


Resources Under Seize.
A computer virus is a type of malicious software
program which when executed replicates itself by
modifying other computer programs and inserting its
own code and has a detrimental effect, such as
corrupting the system or destroying data.
Characteristics of Computer Viruses

• It Cannot exist in a viable form.


• Propagates when the host program is executed.
• Has an incubation period, during which no damage is done.
• After incubation period, begins to manifest its behaviour.
• Virus resides in the memory and replicate itself.
• It does not reside in the memory after completing its task.
Origin & History of Computer Viruses
1949-1966: Self-Reproducing Automata
Self-replicating programs were established in 1949, to produce a large
number of viruses. John von Neumann, known to be the “Father of
Cybernetics”, wrote an article on the “Theory of Self-Reproducing
Automata”.
1981: The first virus to be publicly discussed was created by Richard
Skrenta. The virus was called “Elk Cloner”.
1983: The term “Virus” was coined by Frederick Cohen.
1986: The first personal computer (PC) Computer Virus was created by
Basit and Amjad Farooq Alvi and was called “Brain”.
Symptoms
• Slow Response and slow program execution
• Random hard drive crashes and restarts
• Distorted graphics and text
• Files that have mysteriously vanished
• Inability to open files with existing passwords
• Hang up at the starting time
• Process may take more time than its expected
Components of the virus
1. Search Routine
The search routine is responsible for locating new files, disk
space, or RAM to infect.
2. Infection Routine
Infection Routine is responsible for copying the virus and
attaching it to a suitable host.
3. Trigger Routine
Trigger Routine is to launch the pay-load at a given date and
time. The trigger can be set to perform a given action at a given
time. The trigger is also known as logic bomb.
4. Payload
The payload is the actual body or data that perform the actual
malicious purpose of the virus.
Phases of Viruses
Virus phases is the life cycle of the computer virus. This life cycle can be
divided into four phases:
1. Dormant Phase:
The Virus is idle and eventually activated by some event.
2. Propagation Phase:
The Virus places an identical copy of itself into other programs or into certain
areas on the disk.
3. Triggering Phase:
The Virus is activated to perform the function for which it was intended.
4. Execution Phase:
The function is performed.
Types of Computer Viruses

1. Boot Sector virus


2. File Infector virus
3. Macro virus
4. Multi-Partite virus
5. Polymorphic virus
Boot Sector Virus
• It places its own codes and commands into MBR (Master
Boot Record).
• Infects disk boot sectors and records.
• Boot Sector computer virus spread using physical media i.e.
Floppy disk or USB drive.
File Infector Virus

• A File infector is a virus that infects an executable file.


• Typically affects only one type of file.
• Infects executable files in OS file system.
• Also known as Parasitic virus.
Macro virus

• These type of virus infects Word, Excel, PowerPoint, Access


and other data files.
• Once infected, Repairing of these files is very much
difficult.
Example of Macro virus is Melissa Virus.
Multipartite Virus

• May attack in more than one methods.


• Combine the feature of both File infector and Boot infector.
• Ghost ball was the first multipartite virus.
Polymorphic Virus

• A virus that can encrypt its code in different ways so that it


appears differently in each infection.
• These virus are more difficult to detect.
• A virus that mutates and changes accordingly.
Conclusion
Prevention is better than Cure
• So don’t accept strange files.
• Don’t do double click on everything and try to check file’s extension.
• Learn little bit about batch file commands.
• Install good antivirus( Quick heal ,Norton ,McAfee , Kaspersky etc.)
• Regularly scan your whole system, always try to check processes and all.

Anda mungkin juga menyukai