0% found this document useful (0 votes)
94 views

Computer Virus and Security Risk

Computer viruses pose security risks to hardware, software, data and processing capabilities. Viruses are intentionally created programs that can damage files and systems. They typically infect computers by opening infected files, running infected programs, booting from infected devices, or downloading infected files. Viruses are programmed by virus authors and can spread through email attachments. Common types include worms that replicate to consume memory, Trojan horses that cause damage under false pretenses, and file infectors that spread through program files. Antivirus software detects and removes viruses by identifying patterns in virus code signatures. Users should practice safe computing habits like using antivirus software and avoiding suspicious emails or downloads to prevent infection.

Uploaded by

RANJAN SHARMA
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views

Computer Virus and Security Risk

Computer viruses pose security risks to hardware, software, data and processing capabilities. Viruses are intentionally created programs that can damage files and systems. They typically infect computers by opening infected files, running infected programs, booting from infected devices, or downloading infected files. Viruses are programmed by virus authors and can spread through email attachments. Common types include worms that replicate to consume memory, Trojan horses that cause damage under false pretenses, and file infectors that spread through program files. Antivirus software detects and removes viruses by identifying patterns in virus code signatures. Users should practice safe computing habits like using antivirus software and avoiding suspicious emails or downloads to prevent infection.

Uploaded by

RANJAN SHARMA
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Computer Virus and

Security Risk
Entertainmen
t
Reservation
Reservation

Communica
Communica
tion
tion

Games
Games

Onlin
e
Order food

News
News
Searching
Computer Security Risk- It is a
term known for any event or
action that could be harmful
for a computer hardware,
software, data, information or
processing capability.
-Any illegal act
involving a computer data is
referred as a Computer Crime.
Cyber Crime-Any illegal act
involving Internet and online is
referred as a Cyber Crime.
Hacker-A hacker was originally
a programmer who did not
work for a particular company,
but was specialized to work
with the security mechanisms
for computers and network
systems.
Virus
(Vital Information Resources Under
Seize)- Viruses are programs which
are created deliberately to damage
critical information and data. Eg.
Friday, the 13th Virus, Jerusalem
Virus.
How does a computer get infected by
virus:
Viruses get activated in four basic
ways:-
1. Opening an infected file
2. Running an infected file
3. Booting a computer with infected CD or
pen drive
4. Downloading an infected file from the
Internet.
Virus Author: Viruses in
computers are not generated
accidentally but are
programmed intentionally by a
programmer known as Virus
Author.
Trojan
Worm Horse
File
Infector
Adwar
e
Types of
Viruses

Spywa
re

Rootk
Boot
it Sector
Virus
It is a harmless virus that simply
Worm

replicates itself to eat up the


entire memory of the computer.

Trojan ●
● This Virus comes as a friendly
program and destroys all the
Horse data in our computer.

File It adds virus code to the regular



programming code within the program

Infector
files. So when the infected program is run,
other program files also get infected.
This virus attaches itself to the boot-
Boot-Sector

sector of the disk and affects the


Virus starting and functioning of the
computer.

Rootkit is a program that hides in a

Rootkit

computer and allows someone from a


remote location to take full control of
the computer.

Spywar A program that secretly collects information



about the user and then communicates the

e
same information to some outside source
while the user is online .
A program that displays an

Adwar online advertisement in a


banner, pop-up window or

e
pop-under window on web
pages, email messages or
other Internet services.
Email Virus:
 The Virus that comes with email attachments
is called Email Virus.
How Email Virus Spread?
 When we open an email attachment that
contain a virus, the virus spreads to our
computer.

Effects of Virus on Computer?


 It can damage or rename the important files.
 It can damage or destroy the Operating

System.
 It can decrease the speed of the computer.
 It can reduce the memory or hard disk space.
Virus Prevention:
 Backing up important files frequently.
 Scan all the file by the Antivirus before using

it.
 Always use Antivirus program in your

computer.
Antivirus:
 An antivirus program detects the changes
that a virus causes in the computer.
 It protects a computer against virus, identify

and remove the virus found in the computer.


Virus Signature:
 It is also known as Virus definition, is a
known specific pattern of virus code.
Security Concern:
• Website should be secure
• https should be in the address of website
instead of http
• VeriSign Secured icon should be there with
green background at the address of the website.
DO DON’T


●Use anti-virus
Never
Never give
give out
out personal
personal information
information online.
online.
Use email filter



●Don’t let web browsers remember your

Don’t let web browsers remember your

●Choose strong passwords and change it



username
username and
and password.
password.
at least once in 15 days. ●Don’t click on any email you don’t recognize.

Don’t click on any email you don’t recognize.
●Keep personal information limited.  ●Don’t download illicit or unknown software. 
Don’t download illicit or unknown software. 
● ●

●Always visit secure websites only. ●Don’t give anyone remote access to your

Don’t give anyone remote access to your

●Be careful when downloading programs


● computer. 
computer. 
●Don’t click on any advertisement. 
from the internet. Don’t click on any advertisement. 

●Any people you've met online by yourself,


●Inform to your parents if you are being Any people you've met online by yourself,


inform
inform your
your parents
parents and
and never
never meet
meet them
them
bullied online or any cyber fraud done alone.
alone.
with you.

You might also like