0% found this document useful (0 votes)
2 views

Introduction

The document provides an overview of cybersecurity viruses, detailing their types, methods of spread, and impacts on systems and data. It emphasizes the importance of prevention measures, such as using antivirus software and being cautious with downloads and email attachments. Real-world examples like the ILOVEYOU virus and WannaCry ransomware illustrate the significant threats posed by these malicious programs.

Uploaded by

bhuwneshwar00
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Introduction

The document provides an overview of cybersecurity viruses, detailing their types, methods of spread, and impacts on systems and data. It emphasizes the importance of prevention measures, such as using antivirus software and being cautious with downloads and email attachments. Real-world examples like the ILOVEYOU virus and WannaCry ransomware illustrate the significant threats posed by these malicious programs.

Uploaded by

bhuwneshwar00
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

TOPIC:- UNDERSTANDING VIRUSES AND THEIR MECHANISM

BRAINWARE UNIVERSITY
Department :- COMPUTATIONAL SCIENCE
Programme Name :- Master of Computer Applications
Course Code : - MCA20301B
Course Name : - CYBER SECURITY
Name :- SRIJAYA SARKAR
Student Code :- BWU/MCA/24/038
SECTION :- A
cyber Security

Introduction to
Cybersecurity
Viruses
•Cybersecurity viruses are malicious
programs designed to harm, steal data,
or disrupt systems.
•They replicate by inserting themselves
into legitimate software or files.
•Common ways of infection: email
attachments, downloads, and removable
Page 02
storage devices.
Cyber Security

Types of
Computer
1. File Infector Virus: Attaches to
executable files and spreads when run.

Viruses 2. Macro Virus: Targets macros in


applications like MS Word or Excel.
3. Boot Sector Virus: Infects the master
boot record of a drive.
4. Polymorphic Virus: Changes its code
upon replication to evade detection.
5. Worms: Self-replicating programs that
spread without user intervention.

Page 03
Cyber Security

How Viruses
Spread
1. Phishing emails with malicious
attachments or links.
2. Infected software downloads from
untrusted sources.
3. Malicious websites and pop-ups
tricking users into clicking.
4. USB drives or external storage
carrying infected files.
5. Exploiting system vulnerabilities
through outdated software.

Page 04
Cyber Security

Impact of
Viruses on
Cybersecurit 1.Data Theft: Stealing sensitive user and
business data.
y 2. System Damage: Corrupting files,
slowing performance, causing crashes.
3.Financial Losses: Ransomware attacks
demanding payments.
4.Network Disruptions: Viruses spreading
across networks.
5.Reputation Damage: Cyber breaches
reduce user trust.
Page 05
Cyber Security

Prevention and
Protection
Measures
Data Analytics
1. Install and update antivirus and anti-malware software.
2. Avoid downloading files from untrusted sources.
3. Be cautious with email attachments and unknown
senders.
4. Regularly update operating systems and software.
5. Use firewalls and security settings.
Page 06
6. Perform regular data backups.
Cyber Security

Real-World Examples
of Cybersecurity
Viruses

1. ILOVEYOU Virus 2. WannaCry 3. Stuxnet (2010):


(2000): Spread via Ransomware Targeted industrial
email, causing (2017): Exploited systems.
billions in Windows
damage. vulnerabilities.
Page 07
Cyber Security

Conclusion

1. Viruses are a major cybersecurity threat


but can be prevented with awareness.
2. Always keep software updated and stay
vigilant.
3. Employ multi-layered security strategies.
4. Stay informed about emerging cyber
threats.
Page 8
Cyber Security

Thank You.
Thank You.
Thank You.

Page 9

You might also like