0% found this document useful (0 votes)
13 views61 pages

Computer Virus

The document provides an overview of computer viruses and various types of malware, including their characteristics and methods of infection. It discusses symptoms of virus infections, common sources of malware, and steps to remove viruses from a Windows PC. Additionally, it highlights the significance of antivirus software and the importance of keeping systems updated to prevent infections.

Uploaded by

Mayleen Banera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views61 pages

Computer Virus

The document provides an overview of computer viruses and various types of malware, including their characteristics and methods of infection. It discusses symptoms of virus infections, common sources of malware, and steps to remove viruses from a Windows PC. Additionally, it highlights the significance of antivirus software and the importance of keeping systems updated to prevent infections.

Uploaded by

Mayleen Banera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 61

Good ©

Morning
ICT-
Student
s!
COMPUTER VIRUSES
Computer Virus
 A virus is a destructive executable program
that infects the other programs in the system and
spreads by replicating itself.
 Such a program is designed to damage the
victim‘s computer files.
 Viruses are coded by malicious programmers
in a way that they can spread in the system
without one's permission and knowledge.
Ń©®√Ń©®√
Different Aspects of Computer Virus
• Finder
 searches for the new uninfected files.

• Replicator
 actually targets these files and infects it
by
multiplying itself.
Malware is short for
malicious software and used
as a single term to refer to
virus, spyware, worm, etc. It is
designed to cause damage to
stand-alone computer or a
networked PC. It designed to
damage your computer.
Trojan Horse is a computer program Types of Malware

that appears to be useful software, but


instead compromises your security and
causes a lot of damage.
. Trojan (or Trojan horse) is a form of malware that hides its real
content to trick the computer user into believing that it's a
legitimate file. One common way that this deception happens is
when a trojan arrives attached to an email from a trusted source.
Unlike, viruses, which can activate and replicate themselves, trojans
rely on the user to activate them.
Computer Trojans are named after the wooden horse that was used to
sack the ancient city of Troy. The wooden horse was built and left
outside the city by Greek soldiers who were besieging Troy. The horse
was thought by the people of Troy (known as Trojans) to be a harmless
victory trophy, so they brought it inside the city walls - but inside it
were Greek soldiers who emerged at night and opened the city gates,
Types of Malware

Spyware
Spyware is any technology
that aids in gathering
information about a person
or organization without their
knowledge. It can overload
your system and shutdown
other services.
Example: Advertisements
Types of Malware

As its name implies, this


type of malware inundates
the user with unwanted
advertising.
programs canAdwarechange the browser's homepage, bombard
programs
the screen can
withchange the as well as create spyware.
pop-up ads,
browser'sthis
Although homepage,
software may not sound as bad as other forms
of malware,
bombard theit can be extremely
screen with irritating and disruptive,
and is often
pop-up ads,capable
as well of
ascausing your device long-term
problems. It is common
create spyware. for this malware to slow down or
Although
even crash your
this software maydevice.
not
It can also
sound use as
as bad up other
your internet bandwidth. Adware is the
name for this software when it infects a computer, but is
Types of Malware

What is meant by botnet malware?

A botnet (short for “robot network”) is a network of computers


infected by malware that are under the control of a single
attacking party, known as the “bot-herder.” Each individual
machine under the control of the bot-herder is known as a bot.
Types of Malware
Ransomware
Ransomware is a particularly
sinister
form of malware that is used toencryption to hold a user's data
extort with the promise that the data
money from users by criminals.will be restored upon payment of
It uses a ransom.
Ransomware gets onto a
computer by either fooling the
user into installing it, or by
making use of weaknesses in the
device's security software. This
type of malware can target not
just individual users, but also
high profile institutions such as
Types of Malware
Worm
A worm generally spreads
without user action and
distributes complete copies
(possibly modified) of itself
across networks. A worm can
consume memory or network
bandwidth, thus causing a
computer to stop responding.
 Boot viruses: These viruses infect floppy
disk boot records or master boot records in
hard disks. They replace the boot record
program (which is responsible for loading the
operating system in memory) copying it
elsewhere on the disk or overwriting it. Boot
viruses load into memory if the computer tries
to read the disk while it is booting and often
spreads through removable storage devices
and media. It is difficult to remove and usually
requires the entire hard drive of infected
computers to be reformatted.
Examples: Form, Disk Killer,
Michelangelo, and Stone virus
 Overwrite Virus – One of the most
harmful viruses, the overwrite virus
can completely remove the existing
program and replace it with the
malicious code by overwriting it.
Gradually it can completely replace
the host’s programming code with the
harmful code.
 Resident Virus –This kind of
computer virus embeds in the
computer’s memory. If the original
virus is deleted, a copy of it can
remain in the infected computer’s
memory. It can then be activated when
your operating system performs
certain functions. Since these viruses
hide in your RAM, they often go
undetected by antivirus software.
• .
 File-infecting virus
As the name suggests, it first infects a
single file and then later spreads itself
to other executable files and programs.
The main source of this virus are games
and word processors.
Macro Virus is a new type of
computer virus that infects the
macros within a document or
template. When you open a word
processing or spreadsheet
document(Microsoft Office), the
macro virus is activated and it
infects the Normal template.
Examples: DMV, Nuclear,
Word Concept.
 Web scripting virus
A virus that hides in the
code of web pages and
web browsers. Accessing
web pages whose code
contains such viruses can
lead to your device being
infected.
 Polymorphic virus that can encrypt
its code in different ways so that it
appears differently in each infection.
These viruses are more difficult to
detect. Exist in multiple forms, and
acquire a different form each time
the infected file or program is
executed by changing their code. This
helps them avoid detection
Examples: Involuntary, Stimulate,
Cascade, Phoenix, Evil, Proud, Virus 101
 Multipartite viruses: A hybrid of
Boot and Program viruses. They
infect program files and when the
infected program is executed, these
viruses infect the boot record. virus
which can attack both, the boot
sector and the executable files of an
already infected computer
Examples: Invader, Flip, and
Tequila
 Slow performance: A slow down
in the computer’s processing speed
is usually a dead giveaway for
computer viruses. Malicious code
typically hijacks computing power.
It slows down the speed of the
computer system.
 Device crashes and freeze-
ups: System freezes and crashes
are often signs of malware infection
in general, but viruses can be
designed specifically to cause this.
While this could also be the sign of
an older device, it signals an
infection.
 Persistent pop-ups about
missing files is another symptom.
As you click shortcuts or try to
access files, you may get
notifications they no longer exist. It
could be viruses deleting your
important data.
 Beware when new files
mysteriously appear. Computer
viruses can delete old files and
create new ones.
 Viruses have been known to cause
system changes that affect
external hardware and
accessories. If you can’t get that
USB drive or wireless mouse to
connect properly or work as it
should, it could be a sign of a virus.
 If it seems your device is
executing commands without
your authorization, a virus could be
overriding your system.
Other Symptoms Virus Affects a
System?

•  It corrupts files
•  It slows down the speed of the computer
system
•  It causes the system to hang frequently
•  It deletes various files
 Spam emails and attachments
Security analysts have found anywhere from 75%
to 94% of all malware is delivered by email.
This can happen by opening an email attachment,
or in some cases, by simply viewing the email.
Some viruses are also delivered in the HTML body
of the email. As a result, many email services
disable HTML until you confirm you know the
sender.
 Instant messaging services such as Skype
and Facebook Messenger can also be used to
spread viruses. The most common method is
sending an infected link in a chat message.
People are more likely to click on a link from
someone they know, and virus developers are
well aware of this.
 File-sharing services
Dropbox, SharePoint, and other file-sharing
services are other means of spreading viruses. If a
user uploads an infected file to a file-sharing
account, the computer virus will spread to
anyone else with access to that account.
Although Google Drive and some other services
scan files for viruses, they only scan files smaller
than 25MB.
 Fake antivirus downloads
Sometimes, cybercriminals send pop-up ads to
trick users into thinking their PC has a virus. They
insist the user download their antivirus program
to remove the threat. However, the antivirus
download is a fake one, and it infects the user’s
computer with a virus. This one adds insult to
injury.
Here’s what to look out for when detecting fake
antivirus:
 You have an antivirus program on your computer that
you never installed.
 You cannot shut down or uninstall your antivirus
software.
 Your antivirus software keeps detecting issues and
displaying pop-up windows.
 The issues it finds can only be fixed by purchasing an
upgraded subscription or additional software.
 The term unpatched software refers to
software that isn’t up-to-date. Developers often
release security updates to patch up
vulnerabilities in the software, and it is
essential to actually install these updates.
Cybercriminals often take advantage of these
vulnerabilities to infect computers with
viruses and other malware.
 Hardware
USB drives and other removable storage
devices can contain viruses and spread them
to your computer. While this isn’t quite as
common, bad actors have been known to leave
USB drives riddled with viruses for unsuspecting
victims. If you’re not sure where it came from, it’s
not a good idea to stick hardware into your
computer.
•Did you know?
• Mydoom.
• Mydoom is a computer virus that's considered by many
to be the worst virus in history thus far. In 2004, it cost
around $38 billion worth of damage.
• Is the MyDoom virus still around?
• These attacks were intended to shut down a target
website or server. Mydoom is still around today,
generating 1% of all phishing emails.
•Did you
know?
• Phishing is a type of social engineering
• attack often used to steal user data, including
login credentials and credit card numbers. It
occurs when an attacker, masquerading as a trusted
entity, dupes a victim into opening an email, instant
message, or text message
•Did you
know?
• 560,000 new pieces of malware are detected every day.
• The rate at which malware spreads is terrifying. Anti-
• malware institutes include every new malicious program
they find in their malware database. Hundreds of
thousands of files become infected by malware on
computers and websites every day.
•Did you know?
I LOVE YOU, sometimes referred to as Love Bug or Love
Letter for you, is a computer worm that infected over ten
million Windows personal computers on and after 5 May

2000.
Common name ILOVEYOU
...
ILOVEYOU. Love Bug, Love
Aliases
Letter
Type Computer worm
Point of origin Manila, Philippines
Author(s) Onel de Guzman
•Did you know?
How Many Cyber Attacks Happen per Day
in 2022?

Statistics worldwide.
•Globally, 30,000 websites are hacked daily.
•Every 39 seconds, there is a new attack
somewhere on the web.
•An average of around 24,000 malicious mobile
apps are blocked daily on the internet.
According to https://techjury.net/blog/
Other Sources of Virus Infection

•  Infected CDs, DVDs, pen drives, etc


•  E-mail
•  Browsing infected sites
•  Downloading files from the internet
How to
Get Rid of a
Computer
Virus
How to remove a virus from a
Windows laptop or PC!

1. Download a virus
scanner
To catch and remove the
latest virus threats, you’ll
need a solid antivirus.
How to remove a virus from a
Windows laptop or PC!
2. Disconnect from the
internet
When you are removing a
virus from your PC, it is
good idea to disconnect
from the internet to
prevent further damage:
some computer viruses use
the internet connection to
spread .
How to remove a virus from a
Windows laptop or PC!

3. Enter Safe Mode


Turn your computer off.
Now turn it on again, but
keep pressing the F8
button as it boots up.
An Advanced Boot
Options menu will
appear, and you should
select the option Safe
Mode with
Networking.
How to remove a virus from a
Windows laptop or PC!

4. Delete temporary files


with your Disk Cleanup tool
Using this tool will allow you to
delete all of your temporary
files. To find it, begin by clicking
on your Start menu, followed
by Programs > Accessories >
System Tools > Disk Cleanup.
Select Temporary Files from
the File to Delete list, and go
ahead and delete them. It’s
possible you might catch the
virus here, but you’ll definitely
want to take the next step.
How to remove a virus from a
Windows laptop or PC!

5. Run a virus scan

Run a virus scan using


your chosen anti-virus or
internet security software.
How to remove a virus from a
Windows laptop or PC!

6. Delete or
quarantine the virus
If a virus is found, it may
affect multiple files. Select
“Delete”or Quarantine” to
remove the files and get rid of
the virus. Rescan your
computer to check there’s no
further threats. If threats are
found, quarantine or delete the
files.
Quarantine: Moves the virus to a safe
location that the antivirus software
manages.
How to remove a virus
from a Windows laptop
or PC!

7. Enable firewall
Firewalls also protect you
from cyber attacks and
viruses and should be
enabled on your new
antivirus. On Windows you
can click Windows Start
menu > Settings >
Update & Security >
Windows Security >
Firewall and network
protection to make sure
it’s updated.
STEPS IN INSTALLING ANTIVIRUS
TE
E A
E F
D D!
Direction:
Enumerate the following:
Write your answer in the answer
sheet

1. Give at least 5 types of virus?

2. Write down at least 5 steps on


Burning or testing
installed
equipment/devices
(Disk management
software)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy