3
Most read
5
Most read
10
Most read
Presented by
Rishi Ram Khanal
BIM 6th (108) (TU)
Computer virus and worms
11/27/20201
Look ahead
 Introduction
 Types of virus
 How virus are active
 Computer worm
 Characteristics of warm
 Phases of warm and virus
 Virus vs warm
 conclusion
11/27/20202
WHAT IS COMPUTER VIRUS
 Computer viruses are small software programs that
are designed to spread from one computer to another
and to interfere with computer operation.
 A virus might corrupt or delete data on your
computer, use your e-mail program to spread itself to
other computers,
 or even erase everything on your hard disk.
 Viruses are most easily spread by attachments in e-
mail messages or instant messaging messages.
 That is why it is essential that you never open e-mail
attachments unless you know who it's from and you
are expecting it.
 Viruses can be disguised as attachments of funny
images, greeting cards, or audio and video files11/27/20203
OTHER TYPES OF VIRUS
 Bacteria
Bacteria, also known as rabbits, are programs that
do not directly damage the system.
 Bombs
A bomb is actually a type of Trojan horse that can
be used to release a virus or bacteria.
 Salami
Salam is cut away tiny pieces of data. They can be
particularly dangerous as the damage they do is
small and can be attributed to some truncation of
the system.
11/27/20204
HOW VIRUSES ACTIVE
 We are always afraid that viruses do something
harmful to files when they get active, but not all
the viruses activate.
 Some viruses viruses just spread out, but when
viruses activate they do very different things..
Might play a part of melody or play music in the
background, show a picture or animated picture,
show text, format hard disk or do changes to files.
11/27/20205
COMPUTER WORMS
 A worm is a program that uses computer
networks and security holes to replicate itself.
 Scans the network for another machine that has a
specific security hole and copies itself
 Use up computer processing time and network
bandwidth during replication.
 Carry payloads that do considerable damage.
11/27/20206
Characteristics of a Worm
 Enhanced Targeting
 Enhanced Speed
 Enhanced Capabilities
 Enhanced Destructive Power
11/27/20207
Phases of a worm or virus operation
 Dormant Phase
 Propagation Phase
 Triggering Phase
 Execution Phase
11/27/20208
11/27/20209
Protecting your Computer
System
 ensure that your OS is up-to-date
 To have antivirus software and make sure it has
the capability to scan e-mail and files as they are
download from the internet
 Need to run full disk scans periodically
 Use a Firewall
11/27/202010
Thank you
Any question ?
11/27/202011

More Related Content

PPTX
Virus and Worms
PPTX
Virus & Antivirus
PPTX
Computer worms viruses and Prevention
PPTX
Virus
PPTX
Viruses, worms, and trojan horses
PPT
Computer security: hackers and Viruses
PPTX
Malware & Anti-Malware
PPTX
Computer virus
Virus and Worms
Virus & Antivirus
Computer worms viruses and Prevention
Virus
Viruses, worms, and trojan horses
Computer security: hackers and Viruses
Malware & Anti-Malware
Computer virus

What's hot (20)

PPTX
Virus and Anti Virus - Types of Virus and Anti Virus
PPTX
ANTIVIRUS AND VIRUS Powerpoint presentation
PPTX
COMPUTER VIRUS
PPTX
Malware ppt
PPTX
Computer virus and antivirus
PPTX
Types of malware
PPTX
presentation on computer virus
PPT
Presentation on computer viruses
PPTX
Virus and its types 2
PPTX
Antivirus
PPT
PPTX
Computer virus
PPTX
Computer virus
PPTX
Computer virus
PPTX
Virus and malware presentation
PDF
Computer viruses
PPTX
Computer virus and anti virus presentation
PPTX
Antivirus PPt
PPT
Computer Worms
PPTX
Computer Viruses
Virus and Anti Virus - Types of Virus and Anti Virus
ANTIVIRUS AND VIRUS Powerpoint presentation
COMPUTER VIRUS
Malware ppt
Computer virus and antivirus
Types of malware
presentation on computer virus
Presentation on computer viruses
Virus and its types 2
Antivirus
Computer virus
Computer virus
Computer virus
Virus and malware presentation
Computer viruses
Computer virus and anti virus presentation
Antivirus PPt
Computer Worms
Computer Viruses
Ad

Similar to Computer virus and worms (20)

PPTX
ethical hacking.pptx
PDF
COMPUTER VIRUSES AND WORMS.pdf
PPTX
CSE computer virus.pptx. Computer virus.
PPTX
Virus and worms
PPTX
Virus and Worms
PPTX
Computervirus
PDF
computer virus Report
PPTX
Computer security.pptx
PPTX
VIRUSES.pptx
PPT
Computer VirusesComputer VirusesComputer VirusesComputer VirusesComputer Viruses
PPT
Viruses worms trojan horses lisa
PPTX
Computer viruses
PPTX
PPTX
Kinds of Viruses
PPT
Computer viruses
PDF
radhika.pdf
PPTX
Computer Virus.pptx
PPT
computer virus and about its details and types
PPT
ethical hacking.pptx
COMPUTER VIRUSES AND WORMS.pdf
CSE computer virus.pptx. Computer virus.
Virus and worms
Virus and Worms
Computervirus
computer virus Report
Computer security.pptx
VIRUSES.pptx
Computer VirusesComputer VirusesComputer VirusesComputer VirusesComputer Viruses
Viruses worms trojan horses lisa
Computer viruses
Kinds of Viruses
Computer viruses
radhika.pdf
Computer Virus.pptx
computer virus and about its details and types
Ad

More from rishi ram khanal (20)

PPTX
Measurement of gdp under product method
PPTX
Major social problem in nepal child labour socilology
PPTX
Light source ooad
PPTX
Introduction to java
PPTX
Introduction to artificial intelligence
PPTX
Interview method in research
PPTX
Presentation on kurtosis statistics
PPTX
Importance of double entry accounting system for public limited company (basi...
PPTX
Implementation issues software engineering
PPTX
Effect of migration in developing country
PPTX
GUI (graphical user interface)
PPTX
Goals of firm business finance
PPTX
General register organization (computer organization)
PPTX
GDP and trends economics .rishi
PDF
Final internship-report on the networking department of the internet service ...
PPTX
Field study of crystal finance share broker
PDF
Dijkstra algorithm
PPTX
Database management system
PPTX
Credential reuse cyber security
DOCX
Cisco packet tracer router
Measurement of gdp under product method
Major social problem in nepal child labour socilology
Light source ooad
Introduction to java
Introduction to artificial intelligence
Interview method in research
Presentation on kurtosis statistics
Importance of double entry accounting system for public limited company (basi...
Implementation issues software engineering
Effect of migration in developing country
GUI (graphical user interface)
Goals of firm business finance
General register organization (computer organization)
GDP and trends economics .rishi
Final internship-report on the networking department of the internet service ...
Field study of crystal finance share broker
Dijkstra algorithm
Database management system
Credential reuse cyber security
Cisco packet tracer router

Recently uploaded (20)

PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
giants, standing on the shoulders of - by Daniel Stenberg
Data Virtualization in Action: Scaling APIs and Apps with FME
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Auditboard EB SOX Playbook 2023 edition.
Training Program for knowledge in solar cell and solar industry
NewMind AI Weekly Chronicles – August ’25 Week IV
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Internet of Everything -Basic concepts details
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
future_of_ai_comprehensive_20250822032121.pptx

Computer virus and worms

  • 1. Presented by Rishi Ram Khanal BIM 6th (108) (TU) Computer virus and worms 11/27/20201
  • 2. Look ahead  Introduction  Types of virus  How virus are active  Computer worm  Characteristics of warm  Phases of warm and virus  Virus vs warm  conclusion 11/27/20202
  • 3. WHAT IS COMPUTER VIRUS  Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers,  or even erase everything on your hard disk.  Viruses are most easily spread by attachments in e- mail messages or instant messaging messages.  That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files11/27/20203
  • 4. OTHER TYPES OF VIRUS  Bacteria Bacteria, also known as rabbits, are programs that do not directly damage the system.  Bombs A bomb is actually a type of Trojan horse that can be used to release a virus or bacteria.  Salami Salam is cut away tiny pieces of data. They can be particularly dangerous as the damage they do is small and can be attributed to some truncation of the system. 11/27/20204
  • 5. HOW VIRUSES ACTIVE  We are always afraid that viruses do something harmful to files when they get active, but not all the viruses activate.  Some viruses viruses just spread out, but when viruses activate they do very different things.. Might play a part of melody or play music in the background, show a picture or animated picture, show text, format hard disk or do changes to files. 11/27/20205
  • 6. COMPUTER WORMS  A worm is a program that uses computer networks and security holes to replicate itself.  Scans the network for another machine that has a specific security hole and copies itself  Use up computer processing time and network bandwidth during replication.  Carry payloads that do considerable damage. 11/27/20206
  • 7. Characteristics of a Worm  Enhanced Targeting  Enhanced Speed  Enhanced Capabilities  Enhanced Destructive Power 11/27/20207
  • 8. Phases of a worm or virus operation  Dormant Phase  Propagation Phase  Triggering Phase  Execution Phase 11/27/20208
  • 10. Protecting your Computer System  ensure that your OS is up-to-date  To have antivirus software and make sure it has the capability to scan e-mail and files as they are download from the internet  Need to run full disk scans periodically  Use a Firewall 11/27/202010