Cyber Laws: USIT6076

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Cyber Laws

USIT6076

-Presented By

Divya Murugan
The primary source of cyber law in India is the Information
Technology Act, 2000 (IT Act) which came into force on 17
October 2000.
Virus
 A computer virus is a type of computer
program that, when executed, replicates
itself by modifying other computer
programs and inserting its own code. If
this replication succeeds, the affected
areas are then said to be "infected" with a
computer virus
 A computer virus is a malicious piece of
computer code designed to spread from
device to device. A subset of malware,
these self-copying threats are usually
designed to damage a device or steal data.
General questions
History of Computer Virus …?
 Elk Cloner has the distinction of being the first wild Virus for the home computer.
 “CIN(CHEN-ING-HAU)” the virus was first discovered in 1998.
Signs of a Virus...?
 Your computer runs slower than normal.
 The computer stops or locks up.
Damage caused by virus…?
 They can delete or change files. Some viruses will delete all your files or even reformat
your hard drive making your computer unusable.
 Some virus will slow down your computer dramatically.
Why do people create Computer Virus…?
 To take money.
 To disable a computer or networks.
Types of Virus
1) File Infector Virus :-
To persist on a system, a threat actor uses file infector viruses to inject malicious code into
critical files that run the operating system or important programs. When the system boots or the
program runs, the virus is activated.

2) Macro Virus :-
Microsoft Office files can run macros, and these macros can be used to download additional
malware or run malicious code. Macro viruses deliver a payload when the file is opened, and the
macro runs.

3) Browser Hijacker :-
A virus that can change the settings on your browser will hijack browser favourites, the home
page URL, your search preferences and redirect you to a malicious site. The site could be a
phishing site or an adware page used to steal data or make money for the attacker.

4) Web Scripting Virus :-


Most browsers have defences against malicious web scripts, but older, unsupported browsers
have vulnerabilities that allow an attacker to run code on the local device.
5) Polymorphic Virus :-
Malware authors can use polymorphic code to change the program’s footprint to avoid
detection. Polymorphic viruses make it more difficult for an antivirus to detect and remove them.
6) Boot Sector Virus :-
Your computer drive has a sector solely responsible for pointing to the operating system so that
it can boot into the interface. A boot sector virus damages or controls the boot sector on the drive,
rendering the machine unusable. Attackers will usually spread this virus type using a malicious USB
device. The virus is activated when users plug in the USB device and boot their machine.
7) Resident Virus :-
A virus that can access computer memory and sit dormant until a payload is delivered is considered a
resident virus. This malware may stay dormant until a specific date, time, or a user performs an
action.
8) Direct Action Virus :-
When a user executes a seemingly harmless file attached with malicious code, direct action viruses
deliver a payload immediately. These viruses can also remain dormant until a specific action is taken
or a timeframe passes.
9) Multipartite Virus :-
These malicious programs spread across a network or other systems by copying themselves or
injecting code into critical computer resources.
Related Links

 https://youtu.be/qNodotqsUgg
 https://youtu.be/4sgnHrS-ruE
 https://youtu.be/-5cOM-XPBMI
 https://www.munotes.in/bsc-it-sem6-notes-and-practical-solution.html
Thank You…

You might also like