The document outlines methods to protect against computer viruses, including installing antivirus software, keeping systems updated, and avoiding untrusted sources. It explains how antivirus programs work, highlights famous virus attacks in history, and differentiates between viruses and other types of malware. The future of computer viruses is discussed, emphasizing evolving threats and the need for continuous cybersecurity advancements.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
4 views8 pages
Computer Science Project
The document outlines methods to protect against computer viruses, including installing antivirus software, keeping systems updated, and avoiding untrusted sources. It explains how antivirus programs work, highlights famous virus attacks in history, and differentiates between viruses and other types of malware. The future of computer viruses is discussed, emphasizing evolving threats and the need for continuous cybersecurity advancements.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
COMPUTER VIRUS
THE GLITCH CHRONICLES
HOW TO PROTECT AGAINST VIRUSES? • Install Antivirus Software: Use trusted programs and keep them updated. • Keep Systems Updated: Regularly update OS and software. • Avoid Untrusted Sources: Don't download files from unverified sites or open unknown email attachments. • Use Firewalls: Block unauthorized access to your system. • Backup Data: Keep regular backups for recovery. • Disable Macros: Disable unless necessary. • Be Cautious with External Devices: Scan USB drives and external hard disks before use. HOW DO ANTIVIRUS PROGRAMS WORK? • Signature-based Detection: Recognizes known virus patterns. • Behavioral Analysis: Detects unusual behavior indicating a virus. • Sandboxing: Runs suspicious programs in a safe environment. • Regular Updates: Keeps virus definitions up to date. FAMOUS VIRUS ATTACKS IN HISTORY • ILOVEYOU Virus (2000): Spread via email, causing $10 billion in damages. • Melissa Virus (1999): A macro virus that disrupted email servers. • WannaCry Ransomware (2017): Locked systems until a ransom was paid. DIFFERENCE BETWEEN VIRUSES AND OTHER MALWARE • Virus: Needs a host file or program to activate. • Worm: Self-replicates and spreads independently. • Trojan: Disguises itself as legitimate software. • Spyware: Secretly collects user information. • Ransomware: Locks data and demands payment to unlock. FUTURE OF COMPUTER VIRUSES
• Evolving Threats: More advanced with AI and machine
learning. • Targeting IoT Devices: Smart TVs, wearables, and other internet-connected devices. • Cybersecurity Challenges: Continuous development of defense strategies. KEY TAKEAWAYS
• A computer virus is a harmful program that spreads and
disrupts systems. • Protect systems using antivirus software, regular updates, and avoiding suspicious files. • Understanding virus types helps in identifying and combating them. • Staying vigilant and informed is the best defense. THANK YOU BY YUVARAJ – 11B