1 / 34

V I R U S

V I R U S . PROJECT BY. IFE AKINTAYO -20113192. NANKLING NGOK 20112513 . ADEWUNMI BAMISHIGBIN 20103156. AHMAD AYITOGO 20113362. INTRODUCTION. WHAT IS A COMPUTER VIRUS?.

duer
Download Presentation

V I R U S

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. V I R U S

  2. PROJECT BY • IFE AKINTAYO -20113192 • NANKLING NGOK 20112513 • ADEWUNMI BAMISHIGBIN 20103156 • AHMAD AYITOGO 20113362

  3. INTRODUCTION

  4. WHAT IS A COMPUTER VIRUS? • A computer virus is a term used to describe malware or basically, any computer program that has the potential of copying itself onto a computer without the intervention of other programs or users

  5. A computer virus has a reproductive ability to regenerate itself and infect other computers or other applications within the same machine. A virus can spread rapidly over networks or insecure intranets. It can also be spread by removable medium like USB drive and CDs.

  6. THE HISTORY OF COMPUTER VIRUS • When we think about computer viruses and their creation, the way they work, where they come from and the problems they create, we believe that it is a recent phenomenon or happening that has threatened the PC world to a great extent today. But the actual truth is that computer viruses have been around for longer than most people might think.

  7. The first computer virus popularly known as the 'Brain virus' was created in 1986 by two Pakistani brothers, Amjad and BasitFarooqAlvi. This virus, which spread via floppy disks, was known only to infect boot records and not computer hard drives like most viruses today. The virus also known as the Lahore, Pakistani, Pakistani Brain, Brain-A and UIUC would occupy unused space on the floppy disk so that it. It would also disguise itself by displaying the uninfected boot sector on the disk.

  8. In 1987, the Lehigh virus was discovered at Lehigh University in the United States. The Lehigh virus was the first memory resident file infector that attacked executable files and took control when a file was opened. The Jerusalem virus also appeared around this time at Hebrew University in Israel. Like the Lehigh virus, the Jerusalem virus was also a memory resident file infector. It contained bugs to re-infect programs that were already infected.

  9. Now all these viruses brought about the questions HOW IT WAS CREATED? HOW IT CAN BE SOLVED?

  10. HOW IT WAS CREATED •  It is hard to determine the reasons for all these actions and why virus writers create computer viruses. Some do it for their personal gain, for research projects, pranks, vandalism, etc., while others want to help make improvements in programs.

  11. TYPES OF VIRUSES • Viruses include malware like adware and spyware, though this malware do not have reproductive ability .

  12. MALWARE • Malware is the general term however, that is used to describe all types of malicious code software that re designated to cause harm to computers and other applications. Malware therefore includes such objects like viruses, worms, spyware, phishing, adware, tracking cookies and rootkits. • Types of malware: worms • Worms are acquired mostly by email attachments. At no time should one open an attachment without scanning it for possibilities

  13. SPYWARE • Spywares can sometimes not be that much of a threat to computers. However, the same can cause the slow performance sometimes experience in computers. Spyware, just like the name shows, spies on the browser activities of your machine by monitoring key strokes on the keyboard. The disadvantage is that it can send your browser information to third parties, which can lead to changes happening on the homepage as well as pop-ups that are sometimes experienced on the web browsers. They can also cause redirection of web browser

  14. HOW TO ACQUIRE SPYWARE • Computers can be infected with spyware through clicking on links that are associated to a particular site with spyware, through pop up links that appear on web browsers, which normally come as advertisements. There is also another third method in which spyware can affect computers without the use noticing it. This is through drive-by type download.

  15. HOW TO PREVENT SPYWARE • In order to curb infection of spyware, users must be vigilant and avoid clicking suspicious links. Pop-ups advertisement should be blocked from the web browsers or as such, users avoid clicking on the same. Finally, have an update and efficient antivirus installed on the system.

  16. ADWARE  has threat level of low to intermediate. They do not cause serious harm to computers actually. Adware refers to advertising display software that provides ads in the browser or site in a manner that is annoying to users. The adverts are mostly unexpected, unsolicited and automatically loaded. They cause browsers to display popup menus and windows. Some adware applications also track the browsing patterns of a user and use the data to determine the kind of pop up windows to send to a client

  17. HOW ADWARES ARE ACQUIRED • Through browsers by clicking on popup menus.

  18. HOW TO CONTROL Adware is easy to curb. Having the necessary antivirus that is well updated and is set effectively s the effective way to control hardware.

  19. TYPES OF VIRUS

  20. PROGRAMME VIRUSES • BOOT SECTOR VIRUS MULTIPARTITE VIRUS STEALTH VIRUS POLYMORPHIC VIRUS MACRO VIRUS ACTIVE X OR JAVA CONTROL

  21. SIGNS OF VIRUS -The controllers for your drives are no longer present in the "Device Manager" -You receive constant messages stating that virtual memory is low -the content on your screen looks as if it's melting  -the size of your applications and files keep changing -your programs take much longer to load than before or will not open at all

  22. HOW IT CAN BE SOLVED?

  23. The question of it can be solved? - Brought about the first anti virus In March 1988, the first ANTI –VIRUS was designed to detect and remove the Brain virus. The anti-virus also immunized floppy disks to get rid of the Brian infection. At the same time, the Cascade virus appeared in Germany. The Cascade virus was the first encrypted virus, which was coded and could not be changed or removed.

  24. The search for a better virus solution became viral. Lots of efforts were put to search for a better solution to theses viruses that affected the disk, files and caused a great deal of damage to the computer world. this viruses greatly affected big organizations: such as banks, media organizations and even communication. It was a big set back.

  25. In 1991, Symantec released the Norton Anti-virus software. Anti-virus products from IBM, McAfee, Digital Dispatch and Iris also became available. • This anti-virus aided in solving or reducing viruses to a great minimum.

  26. The way a computer virus infiltrates your PC depends on the type of virus it is. Because all computers viruses have their own features and factors that make them unique and dangerous to the health of your computer. Making it important than ever to learn about the different types of computer viruses lurking in the corners of cyberspace and on the fringes of your hard drive.

  27. The advantage of learning more about these computer viruses is two fold. First, you'll gain valuable knowledge, and second you'll be able to better prevent and deal with a computer virus when and if it preys your computer.

  28. Due to the many different types of computer viruses, it can be confusing at times to diagnose what kind of virus your computer is suffering from. To make the identifying process easier, we've listed earlier some basic types of viruses that you will likely encounter into different groups

  29. Tips on how to prevent computer viruses

  30. Have a reliable antivirus software installed in the system • Have anti-spyware and antimalware programs installed in the system • Avoid visiting suspicious websites. These can be known by alerts generated by antivirus • Scan all email attachment before opening them • Set up automatic virus scanning in the computer regularly • All downloads should be from trusted sites

  31. Update all the software applications running on the system. This includes operating systems and other user applications. Update antivirus too. • Install firewalls in the computer. There are free source firewalls found in the internet. Install these firewalls.

  32. ANTI VIRUS • HELP TO ERADICATE AND QUARANTINE DIFFERENT VIRUS • EX: NORTON, AVG,NOD32,AVIRAL, • MC AFEE….

  33. IN GENERAL • ALWAYS KEEP YOUR COMPUTER SAFE..DO A SECURITY CHECK UP AND UPDATE YOUR ANTI VIRUS AND ALSO FIREWALLS FOR A BETTER EXPERIENCE AND OPTIMUM USE OF YOUR DEVICE. • PROTECT YOUR FILES AND DOCUMNETS

  34. THANK YOU FOR YOUR ATTENTION

More Related