Nis Microproject
Nis Microproject
MICRO-PROJECT REPORT
ON
“Different Types of Virus in Computer Security and Prevention”
In Partial Fulfilment of Diploma in Computer Engineering
(Sixth Semester)
In the Subject of
Network and Information Security [22620]
Submitted By
Vaishnavi Godbole
Arya Borkar
Drushti Kolhe
Mrunali Gulhane
Harshada Kalkar
Submitted To
Certificate
This is to certify, that students whose name mention below of Sixth
Semester of Diploma in Computer Engineering has satisfactorily completed the
Micro project entitled “Different Types of Virus in Computer Security and
Prevention” in Network and Information Security during academic year 2022-23
as Prescribed in MSBTE curriculum .
Place : Arvi
Date : / / 2024
Declaration
We under signed hereby declare that the micro project report entitled
“Different Types of Virus in Computer Security and Prevention” We further
declare that contents of this report are properly citied and well acknowledge. This
present report is not submitted to any other examination of this or any other institute
for the award of any diploma.
( Signature )
__________________________
__________________________
__________________________
__________________________
__________________________
Place : Arvi
Date : / / 2024
The terms ―virus‖ and ―malware‖ are often used interchangeably, but
they‘re not the identical thing. While a computer virus could also be a sort of
malware, not all malware are computer viruses. The easiest thanks to differentiate
computer viruses from other styles of malware is to give some thought to viruses in
biological terms. Take the flu virus, as an example. The flu requires some
reasonably interaction between two people—like a hand shake, a kiss, or touching
something an infected person touched. Once the flu virus gets inside a person‘s
system it attaches to healthy human cells, using those cells to form more viral cells.
A malicious program works in much the identical way: A bug requires a number
program. A computer program requires user action to transmit from one system to
a different. A bug attaches bits of its own malicious code to other files or replaces
files outright with copies of itself. It‘s that second virus trait that tends to confuse
people. Viruses can‘t spread without some style of action from a user, like opening
up an infected Word document. Worms, on the opposite hand, are ready to spread
across systems and networks on their own, making them far more prevalent and
dangerous.
49 Arya Borkar
55 Drushti Kolhe
56 Mrunali Gulhane
57 Harshada Kalkar
PART B - MICRO-PROJECT REPORT
❖ Rationale
The terms ―virus‖ and ―malware‖ are often used interchangeably, but
they‘re not the identical thing. While a computer virus could also be a sort of
malware, not all malware are computer viruses. The easiest thanks to differentiate
computer viruses from other styles of malware is to give some thought to viruses in
biological terms. Take the flu virus, as an example.
The flu requires some reasonably interaction between two people—like a
hand shake, a kiss, or touching something an infected person touched. Once the flu
virus gets inside a person‘s system it attaches to healthy human cells, using those
cells to form more viral cells. A malicious program works in much the identical way:
A bug requires a number program.
A computer program requires user action to transmit from one system to a
different. A bug attaches bits of its own malicious code to other files or replaces files
outright with copies of itself. It‘s that second virus trait that tends to confuse people.
Viruses can‘t spread without some style of action from a user, like opening up an
infected Word document. Worms, on the opposite hand, are ready to spread across
systems and networks on their own, making them far more prevalent and dangerous.
❖ Introduction
❖ HISTORY OF VIRUS
Since the computer virus only hits the programming of the device, it is not
visible. But there are certain indications which can help you analyse that a device
is virus-hit. Given below are such signs which may help you identify computer
viruses:
• Speed of the System – In case a virus is completely executed into your device,
the time taken to open applications may become longer and the entire system
processing may start working slowly
• Pop-up Windows – One may start getting too many pop up windows on their
screen which may be virus affected and harm the device even more
• Self Execution of Programs – Files or applications may start opening in the
background of the system by themselves and you may not even know about
them.
• Log out from Accounts – In case of a virus attack, the probability of accounts
getting hacked increase and password protected sites may also get hacked and
you might get logged out from all of them
• Crashing of the Device – In most cases, if the virus spreads in maximum files
and programs, there are chances that the entire device may crash and stop
working.
The first thing which you might notice in case of virus attack is the speed with
which your system shall process. And then gradually other changes can also be
observed.
❖ Types of Computer Virus
Now that you know about the different types of computer viruses, here are a
few tips on how to avoid letting them in.
• Use a firewall
A firewall is your computer’s first line of defense. While an antivirus program
(more on that later) is active in your computer, detecting and neutralizing
viruses, a firewall sits between your computer and the internet, swatting them
away. Your computer normally comes with a pre-installed firewall – make sure
it’s enabled.
If you suspect you might have a computer virus, here’s how you can detect it.
• These tools are crucial for users to have loaded and up-to-date because a
computer in the absence of antivirus software protection will be infected within
minutes of connecting to the internet.
• The bombardment is constant, which implies antivirus companies have to update
their detection tools periodically to tackle the more than 60,000 new pieces of
malware created every day.
• Today’s malware (an umbrella term that encapsulates computer viruses) alters
appearance suddenly to prevent detection by older definition-based antivirus
programs. Viruses can be designed to cause damage to the device, prohibit a
user from accessing data, or take control of the computer.
What Does Antivirus Software Do?
Various companies create antivirus software and what every one of them offers
can be different but all perform the following essential functions:
1. Scan particular files or directories for any malware or predetermined malicious
patterns.
2. Allow users to plan scans to automatically run for the user.
3. Allow users to conduct a scan of a selected file or the entire computer, or of a
CD or flash drive at any time.
4. Quarantine any malicious piece of program detected, sometimes the user will be
notified of such infection and asked if he/she wants to dump the file, other
programs will automatically do this in the background.
5. Reminds about the ‘health’ of the computer.
6. Always be sure the user has the best, up-to-date security software installed to
protect his/her devices like computers, laptops, tablets, and smartphones.
How Does Antivirus Software Work?
❖ C o nclusio n
Computer viruses have been around for over fifteen years. Over 40,000
different viruses have been cataloged so far. In recent years, the number viruses
have increased dramatically. The damages they cause are estimated to be several
billions of U.S. dollars per year. Most often, the origin of the virus is difficult to
trace. Various kinds of anti-virus software have been developed which detect
viruses and take corrective actions. The anti-virus software needs to be
continually updated to cope with newer types of viruses. The proliferation of the
Internet and Web, have enabled viruses to spread quickly on a massive scale, by
taking advantage of several security loopholes. The continual challenge is to
have quick and effective responses to these virus attacks.
❖ References
▪ https://byjus.com/govt-exams/computer-virus/
▪ https://www.geeksforgeeks.org/types-of-virus/
▪ https://buddycompany.com/post/types-of-computer-virus
▪ https://documents.uow.edu.au/
▪ https://www.jetir.org/papers/
▪ https://www.researchgate.net/publication/3227533_Computer_viruses