Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

COMPUTER VIRUS

COMPUTER VIRUS

Computer Virus is a kind of malicious


software written intentionally to enter a
computer without the user’s permission or
knowledge, with an ability to replicate itself,
thus continuing to spread.
TYPES OF COMPUTER VIRUSES
Resident Viruses

This type of virus is permanent. Its dwells


inside the RAM. From there, it can overcome
and interrupt all of the operations executed by
the system.
Direct Action Viruses

The Main purpose of this virus is to replicate


and to take action when it is executed.
Boot Virus

This Affects the Boot Sector of a floppy or a


hard drive. This is a crucial part of the disk, in
which information on the disk itself is stored
together with a program that makes it possible
to boot the computer from the disk.
Macro Viruses

Infect all files that are created using programs


that contain Macros.
Directory Viruses

Change the paths that indicate the location


of the file.
Polymorphic Viruses

Encrypt or encode themselves in a different


way every time it infect a system.
File Infectors

When one of these programs is ran, directly


or indirectly, the virus is activated,
producing damaging effect.
Companion Viruses

Once they get into the system, they


“accompany” other files that already exist. In
other words, in order to carry out their
infection routines, companion viruses can wait
inside the memory until the program is run or
act immediately by making copies of
themselves.
FAT Viruses

This type of virus attack is especially


dangerous, by preventing access to certain
sections of the hard drive where files are
stored.
Worms

It has the ability to self-replicate and can lead


to negative effects on your system.
Trojan Horses

Another breed of malicious code which unlike


others do not reproduce by infecting other
files, nor do they self-replicate like worms.
Logic Bombs

Camouflaged segments of other programs that


has an objective to destroy data on the
computer once certain conditions have been
met. They go undetected until launched and
the results can be destructive.
Armored Viruses

Attempts to protect itself from anti-virus


software by making anti-virus believe it is
located somewhere else.
Phage Viruses

It is a very destructive virus that rewrites an


executable program with its own code, rather
than just attaching itself to the file.
Spyware

Computer software that is installed


surreptitiously on a personal computer to
collect information about a user, their
computer or their browsing habits without the
user’s informed consent.
Hackers

Someone who attempts to break into computer


systems.

☺ Proficient programmer or engineer


☺ understand the computer’s weak points
☺ Understands computer security
Types of Hackers

Crackers (or Black Hat Hackers)

Blue Hat Hacker


Gray Hat Hacker
White Hat hacker
Script Kiddies
Hacktivist
How to know when you’ve
been Hacked
Webpage Defacement

Dramatic Decrease of Disk Space

High Network Usage

Contact From Other Administrators


New user on your system

Strange Processes running

Unexplained CPU Usage

Things just “Seem Funny”

You might also like