Sc Ppt Virus
Sc Ppt Virus
Secured computing
VIRUS
The CIH virus (Chernobyl), discovered in 1998, was a file infector that
targeted executable files and the BIOS, causing system crashes and
data loss. It spread via infected downloads and floppy disks.
Solution:
Antivirus software: Helped detect and remove the virus.
BIOS protection: New BIOS versions prevented infections.
User precautions: People were advised to avoid untrusted files and back
up data.
Macro Virus
A macro virus is a type of computer virus that infects documents or files that contain
macros, which are small programs used to automate tasks. These viruses are mostly
found in Word documents, Excel spreadsheets, or other programs that allow macros
how it works:
Infection:The virus attaches itself to a macro in a document (like a Word or
Excel file). When you open that document, the virus is triggered.
Spreading:Once the virus is activated, it can spread to other files. If you save
the document and share it, the virus moves with it and infects other
documents.
Damage:The virus may corrupt files, steal information, or even slow down
your computer. It can do things without you knowing, like causing
documents to behave strangely.
Problem Statement
The Melissa Virus was one of the most famous macro viruses, discovered in
1999. It infected Microsoft Word and Excel documents by attaching a malicious
macro . When an infected document was opened, the virus would activate and
send the document to the first 50 contacts in the user's email address book,
spreading quickly. It caused a massive surge in email traffic, disrupting email
systems, and led to significant productivity loss in businesses worldwide.
Solution:
• Antivirus programs: Programs like McAfee and Symantec developed tools to
detect and remove the Melissa virus from infected files and email
attachments.
• Macro security settings: Microsoft added security settings to Office
applications to block or prompt users before running macros from untrusted
sources.
• User education: People were educated about the risks of opening email
Polymorphic virus
The Invader Virus was a multipartite virus that spread through both
files and the boot sector, making it difficult to remove. It caused system
slowdowns and data corruption.
Solution:
• Antivirus software: Detected and removed the virus from both files
and boot sectors.
• Boot sector protection: Added scanning to prevent reinfection.
• System backups: Users were advised to back up important data.
Overwrite Virus
An overwrite virus is a type of computer virus that infects files on your
system and then replaces the original content of those files with its own
code. This means that once the virus infects a file, the original data is lost,
and it is replaced with the virus's malicious code.
how it works:
Infection:The virus attaches itself to a file (like a document or program) on
your computer.
Overwriting Data:Once the file is opened, the virus replaces the original
content of the file with its own code, erasing the original data.
Spreading:As you continue to open and share infected files, the virus spreads
and overwrites more files.
Damage:The original files are lost because the virus replaces the data.It can
cause the computer to slow down or crash because of the damage
Problem Statement
The Sasser Virus (2004) was an overwrite virus that infected Windows
computers, overwriting system files and causing crashes. It spread via
internet security flaws.
Solution:
• Patch updates: Microsoft released security fixes.
• Antivirus software: Helped detect and remove the virus.
• User awareness: Users were encouraged to update systems and use
firewalls.
Spacefiller Virus
A spacefiller virus is a type of computer virus that attacks executable files
on your computer, but instead of overwriting or replacing the data, it adds
extra, unused space to the file. This extra space makes the file appear larger
than it actually is, and this is how the virus spreads and causes problems.
how it works:
Infection:The virus attaches to an executable file (like a .EXE or .COM
file).Adding Empty
Space:Instead of replacing or changing the file’s content, the virus adds
empty space at the end of the file.
Spreading:When you run or share the infected file, the virus spreads to
other files, adding more empty space to them.
Consequences:Takes up disk space, making your computer slower.Can be
hard to detect because it doesn’t change the file’s actual
Problem Statement