Sei sulla pagina 1di 12

COMPUTER VIRUSES

CLASS 11
INFORMATICS
PRACTICES
ON GOING THROUGH THE FOLLOWING
PRESENTATION WE CAN :
• DEFINE THE TERM "VIRUS"
• DEFINE THE PARTS AND FUNCTIONS OF A COMPUTER VIRUS
• EXPLAIN THE PHASES IN WHICH A VIRUS OPERATES
• NAME THE VARIOUS TYPES OF COMPUTER VIRUSES
• EXPLAIN THE STEALTH TECHNIQUES USED BY COMPUTER VIRUSES
• DIFFERENTIATE BETWEEN POLYMORPHIC VIRUSES
VIRUSES

A computer virus is a
type of computer
When this replication
program that, when
succeeds, the affected
executed, replicates
areas are then said to be
itself by modifying
"infected" with a computer
other computer
virus.
programs and
inserting its own code.
Computer viruses currently
Motives for creating viruses
cause billions of dollars' worth
can include seeking profit
of economic damage each
(e.g., with ransomware), desire
year,due to causing system
to send a political message,
failure, wasting computer
personal amusement, to
resources, corrupting data,
demonstrate that a
increasing maintenance costs,
vulnerability exists in
stealing personal information
software.
etc.
VIRUS : FIRST SIGHTINGS

In 1982, a program called "Elk


Creeper was an experimental Cloner" was the first personal
self-replicating program computer virus to appear "in
written by Bob Thomas at BBN the wild"—that is, outside the
Technologies in 1971. single computer or [computer]
lab where it was created.

The first computer virus for


MS-DOS was “Brain” and was
released in 1986. It would
overwrite the boot sector on
the floppy disk and prevent
the computer from booting
VIRUS PARTS AND FUNCTIONS

• A COMPUTER VIRUS HAS VARIOUS PARTS


MENTIONED BELOW:-
• 1. Infection mechanism
• 2.TRIGGER
• 3.PAYLOAD
VIRUS: PARTS EXPLANATION
The trigger, which is also known as a
Infection mechanism (also called logic bomb, is the compiled version
'infection vector'), is how the virus that could be activated any time
spreads or propagates. A virus within an executable file when the
typically has a search routine, which virus is run that determines the event
locates new files or new disks for or condition for the malicious
infection. "payload" to be activated or delivered
such as a particular date.

The "payload" is the actual body or


data that performs the actual
malicious purpose of the virus.
Payload activity might be noticeable
(e.g., because it causes the system to
slow down or "freeze"), as most of the
time the "payload" itself is the
harmful activity.
VIRUS : PHASES
1. DORMANT PHASE
2.PROPOGATION PHASE
3.TRIGGER PHASE
4.EXECUTION PHASE
VARIOUS PHASES OF COMPUTER VIRUS
1. The virus program is idle during this 2.The virus starts propagating, that is
stage. The virus program has managed to multiplying and replicating itself. The virus
access the target user's computer or places a copy of itself into other programs
software, but during this stage, the virus or into certain system areas on the disk. The
does not take any action. The virus will copy may not be identical to the
eventually be activated by the "trigger" propagating version. Each infected program
which states which event will execute the will now contain a clone of the virus, which
virus. Not all viruses have this stage. will itself enter a propagation phase.

3.A dormant virus moves into this phase


4.This is the actual work of the virus, where
when it is activated, and will now perform
the "payload" will be released. It can be
the function for which it was intended. The
destructive such as deleting files on disk,
triggering phase can be caused by a variety
crashing the system, or corrupting files or
of system events, including a count of the
relatively harmless such as popping up
number of times that this copy of the virus
humorous messages on screen.
has made copies of itself.
TYPES OF COMPUTER VIRUSES

1. RESIDENT AND
2.MACRO 3.BOOT SECTOR
NON-RESIDENT
VIRUSES VIRUSES
VIRUSES

4.EMAIL VIRUSES
STEALTH TECHNIQUES USED BY COMPUTER
VIRUSES
1. In order to avoid detection by users, some viruses employ
different kinds of deception. Some old viruses, especially on the DOS
platform, make sure that the "last modified" date of a host file stays
the same when the file is infected by the virus.
2.Some viruses can infect files without increasing their sizes or
damaging the files.
3.Some viruses try to avoid detection by killing the tasks associated
with antivirus software before it can detect them .
POLYMORPHIC AND METAMORPHIC CODES OF
VIRUSES
• POLYMORPHIC CODE • METAMORPHIC CODE
• Polymorphic code was the first • To avoid being detected by
technique that posed a serious emulation, some viruses
threat to virus scanners. Just rewrite themselves completely
like regular encrypted viruses, each time they are to infect
a polymorphic virus infects new executables. Viruses that
files with an encrypted copy of utilize this technique are said
itself, which is decoded by a to be in metamorphic code.
decryption module.
THANK YOU
PRESENTATION BY
S.AMBHARISH
XI-C

Potrebbero piacerti anche