Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 6 лет назад пользователемsodiqjon muxlisov
1 Computer Viruses Prepared By:- Mukhlisov S.S. Listener of group IIT. Prepared By:- Mukhlisov S.S. Listener of group IIT.
2 What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
3 What is a computer virus? Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A computer virus is a self replicating program that cause harm to your computer. A computer virus might delete or change your data. Viruses can be disguised as attachments of funny images, audio and video files.
4 Types of Computer Virus Time Bomb Logical Bomb Worm Boot Sector Virus Macro Virus Trojan Horse Script Virus
5 Time Bomb A time bomb is a virus program that performs an activity on a particular date
6 Logical Bomb A logical bomb is a destructive program that performs an activity when a certain action has occurred.
7 Worm Virus A worm is also a destructive program that fills a computer system with self- replicating information, clogging the system so that its operations are slowed down or stopped
8 Boot Sector Virus A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk
9 Macro Virus A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk
10 Script Virus Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages
11 Trojan Horse Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged. Trojan Horse usually comes with monitoring tools and key loggers
12 The Creeper Virus Written by Bob Thomas in 1971 Infected DEC PDP-10 computers running the TENEX operating system Gained access via the ARPANET Virus displayed message Im the creeper, catch me if you can! The Reaper program was created later to delete Creeper.
13 Jerusalem Virus First detected in Jerusalem 1987 Believed to have been made in Italy Affected the DOS operating system Infects.EXE and.COM files On every instance of Friday the 13 th, deletes every program file that was executed Many different versions exist, became obsolete due to Windows
14 I LOVE YOU worm Created by two Filipino computer programmers Date :May 5 th 2000 year Attacked tens of millions of Windows PCs Programmed in Visual Basic Script Spread via Estimated $ Billion in damages worldwide Considered one of the most damaging worms ever
15 Anna Kournikova virus Created by Dutch programmer Jan de Wit in 2001 Similar to the I LOVE YOU virus, spread through Created by a Visual Basic Worm Generator David L. Smith identified de Wit as who was responsible for the virus Minimal damage
16 Actions to prevent virus infection Always update your anti-virus software at least weekly. Don't share Drive C: without a password and without read-only restrictions.
17 Actions to prevent virus infection Install security updates for your operating system and programs as soon as possible. Jump at the chance to learn more about your computer. This will help you spot viruses. …and so on.
19 If you ask a lot of questions, viruses will attack your computer
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.