CSIT Presentation
CSIT Presentation
Computer Viruses
A type of malware that
disrupts normal system
functions, corrupts or steals
data, or commandeers
networks
Trojans: Disguised as
The Growing
Threat of
Viruses
Modern viruses are
increasingly complex,
targeting sensitive data,
financial systems, and
networks
Similar to biological
viruses:They replicate and
infect host systems.
How Have Computer
Viruses Evolved?
1970s :
Creeper Virus: Experimental,
displayed the message, “I’m
the Creeper: Catch me if you
can!”
1980s :
Elk Cloner: One of the first
viruses to spread outside
controlled environments via
floppy disks
Modern Trends
and Examples
Use of AI and Machine Learning
for adaptive behavior
Rootkit Detection :
• Analyzes actions a program
attempts to execute.
• Flags malicious behavior
Behavioral
Detection:
Predicting and
Preventing Attacks
Sandboxing
Runs software in a safe,
isolated environment
Observes program behavior
before allowing it to execute
Behavior-Based Detection
Predicts future malicious
actions based on past
behavior
Challenges in
Modern
Ransomware Evolution:
Exploits vulnerabilities in critical
Cybersecurity
systems with targeted attacks.
IoT Vulnerabilities:
Proliferation of devices with
weak or no security measures.