0% found this document useful (0 votes)
20 views20 pages

Ajay Kumar Bansal - Virus

Uploaded by

Arvind Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views20 pages

Ajay Kumar Bansal - Virus

Uploaded by

Arvind Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

virus

Vital Information
Resources under Siege
INDEX
 OVERVIEW
 TYPESOF VIRUSES
 WHAT CAUSES COMPUTER VIRSUSES?
 SYMPTOMS OF COMPUTER VIRSUES
 EXAMPLES OF COMPUTER VIRSUES
 HOW TO REMOVE A COMPUTER VIRUS
 HOW TO PREVENT A COMPUTER VIRUS
 CONCLUSION
OVERVIEW
of virus in computer

A computer virus is an ill-natured software application or authored


code that can attach itself to other programs, self-replicate, and
spread itself onto other devices. When executed, a virus modifies
other computer programs by inserting its code into them. If the
virus’s replication is successful, the affected device is considered
“infected” with a computer virus.
The malicious activity carried out by the virus’s code can damage the
local file system, steal data, interrupt services, download additional
malware, or any other actions the malware author coded into the
program. Many viruses pretend to be legitimate programs to trick
users into executing them on their devices, delivering the computer
virus payload.
DEFINITION- A computer virus is a type of malicious software, or
malware, that can spread between computers and cause damage to
data and software
Types of Boot sector virus

Web Scripting Virus


viruses Browser Hijacker

Resident Virus
Direct Action Virus
Polymorphic Virus

File Infector Virus


Multipartite Virus
Macro Virus
Types of viruses
in computer
Every computer virus has a payload that performs an action.
The threat actor can code any malicious activity into the virus
payload, including simple, innocuous pranks that don’t do any
harm. While a few viruses have harmless payloads, most of
them cause damage to the system and its data. There are nine
main virus types, some of which could be packaged with other
malware to increase the chance of infection and damage. The
nine major categories for viruses on computers are:

 Boot Sector Virus


Your computer drive has a sector solely responsible for pointing to the
operating system so that it can boot into the interface. A boot sector
virus damages or controls the boot sector on the drive, rendering the
machine unusable. Attackers usually use malicious USB devices to
spread this computer virus. The virus is activated when users plug in the
USB device and boot their machine.
 Web Scripting Virus
Most browsers have defenses against
malicious web scripts, but older,
unsupported browsers have
vulnerabilities allowing attackers to
run code on the local device.

 Browser Hijacker
A computer virus that can change the
settings on your browser will hijack
browser favorites, the home page URL,
and your search preferences and
redirect you to a malicious site. The site
could be a phishing site or an adware
page used to steal data or make
money for the attacker.
 Direct Action Virus
When a user executes a seemingly
harmless file attached to malicious
code, direct-action viruses deliver a
payload immediately. These computer
viruses can also remain dormant until a
specific action is taken or a timeframe
passes.
 Resident Virus
A virus that can access computer
memory and sit dormant until a
payload is delivered is considered a
resident virus. This malware may stay
dormant until a specific date or time
or when a user performs an action.
 Polymorphic Virus
Malware authors can use
polymorphic code to change the
program’s footprint to avoid
detection. Therefore, it’s more
difficult for an antivirus to detect
and remove them.

 File Infector Virus


To persist on a system, a threat actor
uses file infector viruses to inject
malicious code into critical files that
run the operating system or important
programs. The computer virus is
activated when the system boots or
the program runs.
 Multipartite Virus
These malicious programs
spread across a network or
other systems by copying
themselves or injecting code
into critical computer
resources.

 Macro Virus
Microsoft Office files can run
macros that can be used to
download additional malware
or run malicious code. Macro
viruses deliver a payload
when the file is opened and
the macro runs.
What Causes Computer Viruses?

 Computer viruses are standard programs; instead of


offering useful resources, these programs can damage your
device. Computer viruses are typically crafted by hackers
with various intentions, like stealing sensitive data to
causing chaos in systems. Some hackers create these
malicious programs for fun or as a challenge, while others
have more sinister motives like financial gain or cyber
warfare.

 Hackers may exploit weak points in an operating system or


app to acquire unapproved access and power over a user’s
machine to achieve their goals.
 Ego-driven: Some virus  Sabotage: In some cases,
authors seek fame within disgruntled employees create
the hacker community by computer viruses to
creating destructive or intentionally damage their
widespread viruses that employer’s infrastructure.
garner media attention.  Cyber espionage:
 Cybercrime: Hackers State-sponsored hackers may
often use computer viruses develop advanced persistent
as tools for ransomware threats (APTs) using custom-
attacks, identity theft, and made malware designed for
other forms of online fraud. long-term infiltration into
targeted networks.

The delivery of a computer virus can happen in several ways.


One common method is via a phishing email. Another technique
is hosting malware on a server that promises to provide a
legitimate program. It can be delivered using macros or by
injecting malicious code into legitimate software files.
Examples of Computer Virus
The web contains millions of computer viruses, but only a few have gained
popularity and infect record numbers of machines. Some examples of
widespread computer viruses include:

 Morris Worm – One of the earliest and most pervasive computer virus
examples, this self-replicating computer program spread through the early
Internet in 1988, slowing down or crashing many machines.
 Nimda – This particular type of worm targeted web servers and computers
running Microsoft Windows operating systems, spreading through multiple
infection vectors in 2001.
 ILOVEYOU – A highly destructive worm that spread via email, disguised as
a love confession and caused widespread damage in 2000 by overwriting
files.
 SQL Slammer – A fast-spreading computer worm that exploited
a vulnerability in Microsoft SQL Server, causing network congestion
and disrupting Internet services in 2003.
 Stuxnet – A sophisticated worm designed to target and sabotage
industrial control systems, particularly Iran’s nuclear program, by
exploiting zero-day vulnerabilities in 2010.
 CryptoLocker – This ransomware Trojan, which infected
hundreds of thousands of computers in 2013, encrypted
victims’ files and demanded a ransom for their decryption.
 Conficker – Emerging in 2008, this worm exploited
vulnerabilities in Windows operating systems, creating a
massive botnet and causing widespread infection.
 Tinba – First discovered in 2012, this banking Trojan
primarily targeted financial institutions, aiming to steal login
credentials and banking information.
 Welchia – A worm that aimed to remove the Blaster worm
from infected systems and patch the exploited vulnerability
but caused unintended network congestion in 2003.
 Shlayer – A macOS-specific Trojan that primarily spreads
through fake software updates and downloads, delivering
adware and potentially unwanted programs since 2018.
How to Remove a Computer Virus
 Removing a computer virus can be a challenging task, but there
are several steps you can take to get rid of it.
Common steps to remove a computer virus
include:
 Download and install antivirus software: Assuming you
don’t already have antivirus software installed, download and
install a real-time and on-demand solution, if possible. A real-
time malware scanner scans for viruses in the background while
you use the computer. You must start the on-demand scanner
whenever you want to scan your device.
 Disconnect from the internet: Some computer viruses
use the internet connection to spread, so it’s best to disconnect
from the internet when removing a virus from your PC to prevent
further damage.
 Delete any temporary files: Depending on the type of
virus, deleting temporary files can also delete the virus, as some
viruses are designed to initiate when your computer boots up.
 Reboot your computer into safe mode: To help mitigate damages to
your computer while you remove a virus, reboot your device in ‘Safe
Mode.’ This will inhibit the virus from running and allow you to remove it
more effectively.
 Run a virus scan: Run a full scan using your antivirus software, opting
for the most thorough or complete scanning option available. If possible,
cover all your hard drive letters during the scan.
 Delete or quarantine the virus: Once the virus is detected, your
antivirus software will give you the option to delete or quarantine the
virus. Quarantining the virus will isolate it from the rest of your computer
to prevent it from causing further damage .
 Reboot your computer: Assuming you’ve effectively removed the
virus, your computer can be rebooted. Simply turn on the device as you
would do so normally without initiating the “Safe Mode” option.
 Update your browser and operating system: To complete the
virus removal process, update your operating system and web browser to
the latest version possible. Browser and OS Updates often contain fixes
for particular vulnerabilities and exploits.
Given the general nature of this process, the outcome may vary from virus
to virus and device to device. If you are unsure if you’ve effectively removed
a virus from your computer, contact an IT or computer professional for
assistance.
How to Prevent Computer Viruses
Computer viruses can damage your PC, send sensitive data to
attackers, and cause downtime until the system is repaired. You can
avoid becoming the next computer virus victim by following a few best
practices:

 Install antivirus software: Antivirus should run on any device


connected to the network. It’s your first defense against viruses.
Antivirus software stops malware executables from running on your
local device.
 Don’t open executable email attachments: Many malware
attacks including ransomware start with a malicious email
attachment. Executable attachments should never be opened, and
users should avoid running macros programmed into files such as
Microsoft Word or Excel.
 Keep your operating system updated: Developers for all
major operating systems release patches to remediate common bugs
and security vulnerabilities. Always keep your operating system
updated and stop using end-of-life versions (e.g., Windows 7 or
Windows XP).
 Avoid questionable websites: Older browsers are
vulnerable to exploits used when just browsing a website.
You should always keep your browser updated with the
latest patches and avoid these sites to prevent drive-by
downloads or redirecting you to sites that host malware.
 Don’t use pirated software: Free pirated software
might be tempting, but it’s often packaged with malware.
Download vendor software only from the official source
and avoid using software pirated and shared software.
 Use strong passwords: Make sure your passwords are
highly secure and difficult to guess. Avoid using the same
password across multiple accounts and change them regularly to
mitigate vulnerabilities and prevent hackers from stealing them.
 Remain vigilant: Always be cautious when downloading
files or software from the internet or opening suspicious email
attachments. Turn off file sharing and never share access to your
computer with someone you don’t know. Also, avoid keeping
sensitive or private information stored on your computer
Conclusion
 A computer virus is a type of malicious software that can cause a
variety of problems for computer users. Viruses can spread in a
number of ways, and they can cause a range of damage, from
minor annoyances to serious system failures. However, with the
right precautions, it’s possible to protect your computer from
viruses and to remove them if your computer becomes infected.
 Understanding what a computer virus is, how it spreads, and how
to prevent and remove it is an important part of maintaining a
healthy computer system. By being vigilant and taking the
necessary precautions, you can help protect your computer and
your data from the threat of viruses.
 With cybersecurity threats on the rise, organizations need to
protect all areas of their business. This includes defending their
websites and web applications from bots, spam, and abuse.
 To secure web interactions in a user-friendly, fully accessible and
privacy compliant way, Friendly Captcha offers a secure and
invisible alternative to traditional captchas. It is used successfully
by large corporations, governments and startups worldwide.
Subject- Introduction to Concerned
Branch of Engineering(cse)
Submitted By-
Name-Ajay Kumar Bansal
Course- B.tech(AI & ML) 1st year
Section-A(G1)
Submitted To- Ms. Ulfat

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy