0% found this document useful (0 votes)
17 views15 pages

History of Computer Virus

asdasd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views15 pages

History of Computer Virus

asdasd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

History

of
Comput
er
Reported by Harvey Perater
Table of POINTS FOR DISCUSSION:
Content What is a Computer Virus

s What is the First Computer Virus Created

Types of Computer Viruses

History of I Love You Virus


History of Computer
Virus
A computer virus is a type of malware that, when
executed, replicates itself by modifying other
computer programs and inserting its own code
into those programs. If this replication succeeds,
the affected areas are then said to be "infected"
with a computer virus, a metaphor derived from
biological viruses.
What is the First
Computer Virus
Created
THE FIRST COMPUTER VIRUS,
CALLED "CREEPER SYSTEM", WAS
AN EXPERIMENTAL SELF-
REPLICATING VIRUS RELEASED IN
1971.
It was filling up the hard drive until a
computer could not operate any further.
This virus was created by BBN technologies
in the US.
Types of Computer Viruses

01 02 03
Trojan Malware Ransomware

04 05 06
Worms Spyware Rootkits
Trojan Horse Virus

Commonly called "Trojans," these programs


hide in plain sight by masquerading as
legitimate files or software. Once downloaded
and installed, Trojans make changes to a
computer and carry out malicious activities,
without the knowledge or consent of the
victim.
Malware

Malware, or malicious software, is any


program or file that is intentionally
harmful to a computer, network or
server.
Ransomware
Ransomware infects your computer, encrypts
your Personal Identifiable Information (PII) and
other sensitive data such as personal or work
documents and then demands a ransom for
their release. If you refuse to pay, the data is
deleted. Some ransomware variants lock out
all access to your computer. Sometimes, they
might claim to be the work of legitimate law
enforcement agencies and suggest that
Computer Worms
Unlike viruses, worms don't require human help in
order to infect, self-replicate or propagate. As soon as
they breach a system, they infect their entry point
and spread through the device and across any
network to which the device connects. By exploiting
network vulnerabilities—such as missed
operating system (OS) updates or application
patches, weak email security or poor internet safety
practices—worms can execute, self-replicate and
propagate at an almost exponential rate as each new
infection repeats the process. Originally, most worms
simply "ate" system resources and reduced
performance. Now, most worms contain malicious
"payloads" designed to steal or delete files upon
execution.
Spyware
Spyware does just what it says. It spies on what
you're doing at your computer. It collects data
such as keystrokes, browsing habits, location data
and even login information. While adware might
include "repurposing" collected data for sale in the
terms of service statement, spyware is more
duplicitous. Spyware is considered malware
because users are unaware of it. The only intent of
spyware is malicious. Spyware collects and sells
your data to third parties, typically cyber criminals,
with no regard for how the data will be used.
Spyware may also modify specific security settings
on your computer or interfere with network
Rootkits
Rootkits allow remote access or control of a
computer by a third party. These programs
are useful for IT professionals trying to
troubleshoot network issues remotely, but
they can easily become nefarious. Once
installed on your computer, rootkits allow
attackers to take complete control of your
machine to steal data or install additional
malware. Rootkits are designed to go
unnoticed and actively hide their presence
and that of other malware that they install.
History of I Love You Virus
The ILOVEYOU virus first appeared
on May 4, 2000, when it was
released by two Filipino college
students. It quickly spread across
the world via email, taking
advantage of people's natural
curiosity and duping them into
opening an attachment included in
the message.
The Man Who Created
The I Love You Virus

De Guzman, who was poor and struggling to pay for Internet access at the
time, created the computer worm intending to steal other users'
passwords, which he could use to log in to their Internet accounts without
needing to pay for the service. He justified his actions on his belief that
Internet access is a human right and that he was not actually stealing.

The worm used the same principles that de Guzman had described in his
undergraduate thesis at AMA Computer College. He stated that the worm
was very easy to create, thanks to a bug in Windows 95 that would run
code in email attachments when the user clicked on them. Originally
designing the worm to only work in Manila, he removed this geographic
restriction out of curiosity, which allowed the worm to spread worldwide.
PRESENTED BY HARVEY PERATER

THANK
YOU
VERY
MUCH!

You might also like