Computer threat

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Computer security threat

Virus and its type


COMPUTER THREAT:
 Threat is a computer program ,an event or
even a person which causes loss of data
affecting the working of computer and
stealing information
 Types of threat are.

 Mal war

 Virus

 Hacker

 Woram.
VIRUS:
 A virus is a program that may disturb the
normal working of computer with out
knowledge or permission of user.
 Another define (computer virus is the most

common and well know computer security


threat. A computer virus is a program written
intentionally to alter the way a computer
operates without the permission or
knowledge of user). A virus replicates and
excutes of setf by attaching copies to other
files such as program file or documents so
that the user chicks from them and the virus
activates .
 Exp :NYB, Antiexe, win95,FDODO,Cascade

etc.
ACTIVATION OF VIRUS:

 Damage or delete file.


 Erase data in hard disk.

 Causes erratic system behaviour.

 Display annoying massage etc.


HOW VIRUS SPREAD:
 Virus spreads by following way.
 Infected flash drives and disk.

 E.mail attachments.

 Surfing insecure website.

 installing pirated software.


TYPES OF VIRUS:
 Boot sector virus.
 Chernobal virus.

 Logic boomb.

 Trojan horse.

 Redlof.
1.BOOT SECTOR VIRUS:
 Disk is divided into tracks and sector . The
disk contain operating system has sector
program in his first sector. The sector is
known as BOOT SECTOR. The program in
boot sector is automatically loaded into
memory when computer start. The boot
sector virus modifies the program in the boot
sector. When computer turn on it is loaded on
the memory. The virus is attached with files
like .exe, .com files and .dill files. When we
uses file which have this virus. The virus
activates and causes destructive command
and destory data file.
2.CHERNOBAL VIRUS (CIH):
 The famous chernobal virus deletes all
microsoft office files. This may delete
partition information from the disk which
causes major data lost.(1998)
3.LOGIC BOMB:
 Its also called time boom. Its differs from
other virus. Its activates as certain time. Like
michelangelo is an important virus which
deletes all data on march 06.
4.TROJAN HORSE:
 Hide. It itself as useful program. Its contain
hidden instruction to erses data or causes
other damage. It executes illegal, destructive
instruction in the middle of a program such
as games. FORMAT C is a trojan horse virus.
REDLOF:
 Red lof is a polymorphic virus. It is written in
visual basic script. It relies on the micro soft
active x component to excute itself. It locates
folders.htt and infects that file,folder.htt. Is
part of micro soft window active desktop
feature.

You might also like