0% found this document useful (0 votes)
9 views14 pages

CSIT Presentation

Uploaded by

Sumit Gon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

CSIT Presentation

Uploaded by

Sumit Gon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Understanding

Computer Viruses
A type of malware that
disrupts normal system
functions, corrupts or steals
data, or commandeers
networks

Poses threats to individuals


and organizations in the
digital world
Key Types of
Modern Computer
Viruses
Ransomware: Locks users out
of their systems until a
ransom is paid

Worms: Replicate and


spread autonomously across
networks, causing disruption

Trojans: Disguised as
The Growing
Threat of
Viruses
Modern viruses are
increasingly complex,
targeting sensitive data,
financial systems, and
networks

Understanding their evolution


and behavior is essential for
combating them
"In an expanding connected age,
cybersecurity is not just a tool but a
Effective protection requires necessity"
What are
Computer
Viruses?
A computer virus is malicious
software (malware) designed
to :
• Spread from one computer
to another.
• Interfere with normal
operations

Similar to biological
viruses:They replicate and
infect host systems.
How Have Computer
Viruses Evolved?
1970s :
Creeper Virus: Experimental,
displayed the message, “I’m
the Creeper: Catch me if you
can!”

1980s :
Elk Cloner: One of the first
viruses to spread outside
controlled environments via
floppy disks
Modern Trends
and Examples
Use of AI and Machine Learning
for adaptive behavior

Rise of Fileless Malware: Hides


in system memory, evading
detection

WannaCry (2017) : A ransomware


attack affecting 200,000+
computers across 150 countries

• Started as a banking Trojan


How Modern Anti-
Viruses Fight Back
Hackers spread viruses to:
• Steal personal information
• Destroy files and systems

Cross-checks files against a


database of known malicious
software
Limitation: Ineffective against:
• New viruses not in the
database
How Modern Anti-
Viruses Fight Back
Heuristic Analysis :
• Groups related malware
into families
• Uses generic signatures to
detect mutations

Rootkit Detection :
• Analyzes actions a program
attempts to execute.
• Flags malicious behavior
Behavioral
Detection:
Predicting and
Preventing Attacks
Sandboxing
Runs software in a safe,
isolated environment
Observes program behavior
before allowing it to execute

Behavior-Based Detection
Predicts future malicious
actions based on past
behavior
Challenges in
Modern
Ransomware Evolution:
Exploits vulnerabilities in critical
Cybersecurity
systems with targeted attacks.

IoT Vulnerabilities:
Proliferation of devices with
weak or no security measures.

Social Engineering: Human


error exploited via phishing and
scams.

Nation-State Threats: State-


sponsored actors targeting
Future Directions
in Cybersecurity
Potential to redefine encryption
through: Quantum-resistant
cryptography:
Secure against quantum
attacks.
Quantum Key Distribution
(QKD): Ensures secure
communication.

Blockchain for Security:


Decentralized and tamper-proof
solutions for:
Digital identities, supply chains,
and financial transactions.
Eliminates central points of
Toward a Safer
Governments, businesses, and
individuals must:
Digital Future
• Invest in advanced
technologies.
• Promote cybersecurity
education and awareness.
• Foster a culture of vigilance.
Vision for the Future:
• Collaboration and innovation as
key drivers.
• Building a world where
technology empowers rather
than endangers.
Call to Action:
• Let’s work together to create a
secure and interconnected

You might also like