You are on page 1of 12

COMPUTER PROJECT

TOPIC: COMPUTER VIRUS


NAME: TEJAS GUPTA
CLASS 7D
ROLL NO.42
ADMISSION NUMBER: 2014190
SUBJECT: COMPUTER SCIENCE
INDEX
S.NO TOPIC SLIDE NUMBER

1 WHAT IS A COMPUTER VIRUS 3

2 MALWARE 4

3 TYPES OF MALWARE 5-7

4 TYPES OF VIRUSES 8

5 5 TRAITS OF VIRUSES 9

6 SYMPTOMS OF COMPUTER VIRUS 10

7 BIBLIOGRAPHY 11

9 ACKNOWLEDGEMENT 12
WHAT IS A
COMPUTER
A VIRUS?
computer virus is a program which can
harm our device and files and infect them
for no further use. When a virus program is
executed, it replicates itself by modifying
other computer programs and instead enters
its own coding. This code infects a file or
program and if it spreads massively, it may
ultimately result in crashing of the device.
People unknowingly spread a virus by
sharing infected files. Example-Melissa
What is malware?
Malware is intrusive software that is
designed to damage and destroy
computers and computer systems.
Malware is a contraction for
“malicious software.” Examples of
common malware includes viruses,
worms, Trojan viruses, spyware,
adware, and ransomware.
TYPES OF MALWARE
● RANSOMWARE
● SPYWARE
● ADWARE
● TROJAN
● WORMS
● BOTS
● ROOTKITS
● KEYLOGGERS
TYPES OF MALWARE
● RANSOMWARE- IT is software that uses encryption to disable a target’s access to its
data until a ransom is paid. The victim organization is rendered partially or totally unable to
operate until it pays, but there is no guarantee that payment will result in the necessary
decryption key or that the decryption key provided will function properly.

● SPYWARE-It collects information about users’ activities without their knowledge or


consent. This can include passwords, pins, payment information and unstructured
messages

● ADWARE- It tracks a user’s surfing activity to determine which ads to serve them.
Although adware is similar to spyware, it does not install any software on a user’s
computer, nor does it capture keystrokes. The danger in adware is the erosion of a user’s
privacy

● TROJAN- It disguises itself as desirable code or software. Once downloaded by


unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.
Trojans may hide in games, apps, or even software patches, or they may be embedded in
attachments included in phishing emails.
TYPES OF MALWARE
● WORMS- It target vulnerabilities in operating systems to install themselves into networks. They
may gain access in several ways: through backdoors built into software, through unintentional
software vulnerabilities, or through flash drives. Once in place, worms can be used by malicious
actors to launch DDoS attacks, steal sensitive data, or conduct ransomware attacks.

● BOTS- It is a software application that performs automated tasks on command. They’re used
for legitimate purposes, such as indexing search engines, but when used for malicious
purposes, they take the form of self-propagating malware that can connect back to a central
server.

● ROOTKITS- It is software that gives malicious actors remote control of a victim’s computer with
full administrative privileges. Rootkits can be injected into applications, kernels, hypervisors, or
firmware. They spread through phishing, malicious attachments, malicious downloads, and
compromised shared drives. Rootkits can also be used to conceal other malware, such as
keyloggers.

● KEYLOGGERS-It is a type of spyware that monitors user activity. Keyloggers have legitimate
uses; businesses can use them to monitor employee activity and families may use them to keep
track of children’s online behaviors.
Types of viruses

01 02 03
Program Boot sector Bimodal
virus virus virus
 is a type of malicious
is a type of malware
code written to alter
that infects a is one that infects
the way a computer
system's boot both boot records and 
operates and is
partition or the files on the 
designed to spread
Master Boot Record computer system.
from 1 computer to
(MBR) of a hard disk
another.
5 traits of viruses
● The virus can infect many records of infected computer 

● They can stay on the computer even if the hard disk is formatted

● The virus can bring other viruses: A virus can lead to another
virus making it much more lethal and help each other to hide or
even assist you to infect a particular section of the computer.

● Can be furtive

● They may be resident in memory or not


Symptoms of computer virus:-
• Your computer or web browser has dramatically slowed down over a
period of a few days/a week.

• Frequent freezing or crashing.

• Modified or deleted files.

• New programs or desktop icons that you do not recall


installing/creating.

• Programs running without your consent.

• Programs closing without your consent.


BIBLIOGRAPHY
● https://byjus.com/govt-exams/computer-virus/#What-is-a-Computer-Virus?
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.hiclipart.com%2Fsearch%3Fclipart%3Dcom
puter%2BVirus&psig=AOvVaw3Vg7zmgzXz9fsOW7-fkvXd&ust=1649510617048000&source=images&cd
=vfe&ved=0CAoQjRxqFwoTCPjh1YrIhPcCFQAAAAAdAAAAABAD
● https://www.cisco.com/c/en_in/products/security/advanced-malware-protection/what-is-malware.html
● https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

● https://us.norton.com/internetsecurity-malware-what-is-a-computer-virus.html#:~:text=In%20more%20t
echnical%20terms%2C%20a,order%20to%20execute%20its%20code
.
● https://www.acronis.com/en-sg/articles/boot-sector-virus/#:~:text=A%20boot%20sector%20virus%20is,t
he%20virus%20executes%20malicious%20code
.
● https://www.webopedia.com/definitions/bimodal-virus/
● http://www.projectsjugaad.com/computingtips/characteristics-of-computer-viruses.html
● https://it.stonybrook.edu/help/kb/symptoms-of-an-infected-computer

● https://www.acronis.com/en-sg/articles/boot-sector-virus/#:~:text=A%20boot%20sector%20virus
%20is,the%20virus%20executes%20malicious%20code.
Acknowledgment
●I would like to thank my computer
teacher sir Brandon Mondal for
giving me an opportunity to do this
project. I would also like to thank
my parents for giving me
interesting ideas .

You might also like