Presentation is loading. Please wait.

Presentation is loading. Please wait.


Similar presentations

Presentation on theme: "NAME SURNAME STUDENT NUMBER FRANCIS EHIS EDORUMHEN 127974 ANTHONY CHIGO AJAEGBUEZE 109701."— Presentation transcript:




4  Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.  Computer viruses have been around for a long time, long as personal computing and mainstream software development — and they've been making international news since the Internet graduated from a researcher's toy to a tool for consumers.  The twist these days is that more viruses are specifically targeted to steal personal data and make money for their creators,  If you've ever wondered what the first viruses were like and just how bad or dangerous they were, this Project should be an interesting one for you.

5  A computer virus is an executable computer program which has replicating capabilities and can move from one computer to another. This replicating probability is harmful to the computer because it quickly uses up all the available memory and makes the whole system come to a halt.  A computer virus can corrupt data that is on the computer or even delete it. The virus can also replicate and spread itself to other computers through programs. Some viruses are even capable of destroying all the data and information that is found in the hard disk.  Computer viruses are executable programs capable of self replicating and self modifying in the system with the motive of disrupting operations. The viruses may multiply in your computer, most especially, at the storage devices example, memory, hard disk, floppy disk and compact disk (CD) e.t.c. everything about computer viruses is unauthorized.

6  A worm is similar to a virus by design and is considered to be a sub-class of a virus.  Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.  A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.  The biggest danger with a worm is its capability to replicate itself on your system it could send out hundreds or thousands of copies of itself, creating a huge devastating effect.  One example would be for a worm to send a copy of itself to everyone listed in your address book.  Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.

7  A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after.  The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system.  Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self- replicate.

8  In 1944 John von Neumann was The first scientist to theorize about the possible existence of viruses in computers. He did this when he gave a series of lectures on the ‘Theory of self reproducing automata’ In these lectures, he contemplated the occurrence of self replicating computer codes.  In 1960s viruses known as the Creeper was identified It was able to replicate itself and spread to other computers on the ARPANET. This was a predecessor of the Internet and was used by the American defense force and universities in America. This virus did not cause much damage but it was proof about the power of viruses.  In 1974 more harmful virus known as Wabit was designed. It would replicate itself over and over again until the machine crashed completely. This was because the replication led to the full utilization of the system’s resources until it could not function at all. This virus also did not cause much damage as there were a very small number of computers in use at that time.

9  Brain, 1986  Stoned, 1987  Form, 1990  Michelangelo, 1992  VCL, 1992  Happy99, 1999  Monkey, 1993  Concept, 1995  Melissa, 1999  Code Red, 2001  Loveletter, 2000  Slammer, 2003  Sobig, 2003  Mydoom, 2004  Sasser, 2004  Fizzer, 2003  Cabir, 2003  SDBot, 2003  Haxdoor, 2005  Sony BMI, 2005  Stuxnet, 2010  Storm Worm, 2007  Mebroot, 2008  Conficker, 2008  3D Anti Terrorist

10  Brain  In1986 Basit and Amjad Alvi created and marketed medical software in Lahore, Pakistan. This PC virus was designed to fight piracy.  First, they wanted to check the multi-tasking functionality in the new DOS operating system. And they wanted to see if there are security vulnerabilities in DOS compared to other operating systems such as Unix.  When they realized that DOS was quite vulnerable, they had the idea to write a snippet of software that would monitor how the software and the floppy disks move around. Brain spread virally via 3 1/4-inch disks, and within weeks, the Alvi’s had to change their phone numbers.  Stoned  In 1987 a high school student in New Zealand, created this virus, Stoned was supposed to be harmless. It simply displayed the message “Your PC is now Stoned!” on your screen. However, as the first virus that infected a PC’s boot sector, Stoned established that viruses could control a computer’s function from the moment it turned on.

11  Form:  In 1990 Form became one of the most widespread viruses ever. On the 18th of each month, it produced a clicking sound from the PC’s speaker whenever a key was pressed. Annoying, but harmless.  Form virus included V-Sign, which displayed a V on your screen.  The Walker virus showed an elderly man walking across your screen.  And then there was Joshi. Every year, on the Joshi’s birthday, this eponymous virus displayed a birthday message the machine refused to boot up until the user typed “Happy Birthday Joshi.”  Happy99,  In 1999 Happy99 was the first virus. It greeted you with “Happy New Year 1999” and ed itself to all contacts in your address book. Like the very first PC viruses.  Happy99 did not cause any real damage, though it did spread to millions of PCs around the world.

12  3D Anti Terrorist  This trojanized “game” targets Windows Mobile phones and was spread via freeware sites.  Once installed, it starts making calls to expensive numbers leaving you with large charges.  Love letter,  In 2000 the computer worm that broke millions of hearts, Love letter is still one of the biggest outbreaks of all time. It spread via attachment and overwrote many of the crucial files on the PCs it infected.  This outbreak was an incredible successful attempt at social engineering. Using the promise of love, it convinced millions to open the attachment, causing an estimated $5.5 billion in damage worldwide.  Storm Worm  In 2007 Machiavelli said it’s better to be feared than loved.  Seven years after Love letter, Storm Worm capitalized on our collective fear of bad weather and first spread generally via an message with the subject line “230 dead as storm batters Europe.” Once the attachment was open, a Trojan backdoor and a root kit forced the PC to join a botnet. Botnets are armies of zombie computers that can be used to, among other thing, send out tons of spam.  And this one sucked in ten million computers.


14  Computer virus: Refers to a program code which has a capacity to replicate recursively by itself.  Computer worm: Refers to an independent program code which has a capacity to replicate recursively by itself.  Independent means that a computer worm does not have a host program which the worm has infected or replaced by its own code. Computer worms are a subgroup of computer viruses.  Trojan horse: Refers to a self-standing program code which performs or aims to perform something useful, while at the same time it intentionally performs, unknowingly to the user, some kinds of destructive function.

15 ADVANTAGES DISADVANTAGES  A lot of programmers have decided to end their living in writing viruses and its anti viruses just to earn money and gain popularity.  You might also need to pay the PC technician to reformat the system if seriously infected.  Many educational and financial institution uses virus as keep off for internet hackers, internet scanners  Loss of files and data  It reduce the performance of a computer system, making it slow in operation.  Corruption of software's and drivers  It causes computer stress.

16  McAfee Virus Scan  Avast Antivirus  Norton AntiVirus  Kaspasky AntiVirus  Avira AntiVirus

17  We have gone through the basic definitions of viruses and other destructive programs, advantages and disadvantages of computer virus, history of virus, infamous virus, type's e.t.c. we have also explained the differences of virus.  In the bid to catch up with the latest technology in the world today, computers are taking over our lives, from office to shopping and E-banking.  Computer viruses are capable of prolonging more harms in the computing environment, and also causing a lot of computer stress to computer users. . We cannot run away from computer because of virus. Therefore, necessary precaution need to be taken has been discussed in this presentation

18  Any Question About What We Have:  Discuss &  Explain So far???????

19      history.html history.html


Similar presentations

Ads by Google