Cyber Laws: USIT6076
Cyber Laws: USIT6076
Cyber Laws: USIT6076
USIT6076
-Presented By
Divya Murugan
The primary source of cyber law in India is the Information
Technology Act, 2000 (IT Act) which came into force on 17
October 2000.
Virus
A computer virus is a type of computer
program that, when executed, replicates
itself by modifying other computer
programs and inserting its own code. If
this replication succeeds, the affected
areas are then said to be "infected" with a
computer virus
A computer virus is a malicious piece of
computer code designed to spread from
device to device. A subset of malware,
these self-copying threats are usually
designed to damage a device or steal data.
General questions
History of Computer Virus …?
Elk Cloner has the distinction of being the first wild Virus for the home computer.
“CIN(CHEN-ING-HAU)” the virus was first discovered in 1998.
Signs of a Virus...?
Your computer runs slower than normal.
The computer stops or locks up.
Damage caused by virus…?
They can delete or change files. Some viruses will delete all your files or even reformat
your hard drive making your computer unusable.
Some virus will slow down your computer dramatically.
Why do people create Computer Virus…?
To take money.
To disable a computer or networks.
Types of Virus
1) File Infector Virus :-
To persist on a system, a threat actor uses file infector viruses to inject malicious code into
critical files that run the operating system or important programs. When the system boots or the
program runs, the virus is activated.
2) Macro Virus :-
Microsoft Office files can run macros, and these macros can be used to download additional
malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the
macro runs.
3) Browser Hijacker :-
A virus that can change the settings on your browser will hijack browser favourites, the home
page URL, your search preferences and redirect you to a malicious site. The site could be a
phishing site or an adware page used to steal data or make money for the attacker.
https://youtu.be/qNodotqsUgg
https://youtu.be/4sgnHrS-ruE
https://youtu.be/-5cOM-XPBMI
https://www.munotes.in/bsc-it-sem6-notes-and-practical-solution.html
Thank You…