KEMBAR78
Myarticle | PDF | Computer Virus | Malware
0% found this document useful (0 votes)
17 views4 pages

Myarticle

Uploaded by

bk8218520
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views4 pages

Myarticle

Uploaded by

bk8218520
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Slide 1: Title

Types of Computer Viruses & Antivirus Solutions


Your Name Deepanshi Date June 2025

Slide 2: Agenda
1. What Is a Computer Virus?

2. Major Virus Categories

3. How Viruses Spread

4. Antivirus: Definition & Techniques

5. Popular Antivirus Products

6. Best Practices & Recommendations

7. Q&A

Slide 3: What Is a Computer Virus?


• Malicious code that attaches itself to host files

• Replicates and spreads when the host file is executed

• Can corrupt, steal or delete data; disrupt system operations

• Part of broader malware family

Slide 4: Major Virus Categories (1/2)


1. File Infector
– Hooks into executables (.exe, .com)

– Activates when program runs


– Example: Cascade, Win32/Sality

2. Boot Sector Virus


– Infects the Master Boot Record (MBR)

– Loads before OS, hard to remove

– Example: Michelangelo, Stone

Slide 5: Major Virus Categories (2/2)


3. Macro Virus
– Targets document macros (Word, Excel)

– Spreads via shared files

– Example: Melissa, Concept

4. Polymorphic/Metamorphic
– Alters own code to evade signatures

– Polymorphic: simple encryption changes

– Metamorphic: rewrites entire body

5. Trojan Horse
– Disguised as legitimate software

– Doesn’t self-replicate

– Provides backdoor

Slide 6: How Viruses Spread


• Email Attachments: Infected documents or executables

• Removable Media: USB drives, external HDDs

• Network Shares & P2P: Shared folders, torrent clients


• Malicious Websites: Drive-by downloads

• Software Vulnerabilities: Unpatched OS or apps

Slide 7: Antivirus Defined


• Software designed to detect, quarantine, and remove malware

• Core components:
1. Scanner (on-demand)

2. Real-Time Shield (on-access)

3. Behavior Monitor

4. Cloud-Based Analysis

Slide 8: Antivirus Techniques


1. Signature-Based Detection
– Matches known virus “fingerprints”

– Fast but misses new threats

2. Heuristic Analysis
– Flags suspicious code patterns

– Reduces zero-day window

3. Behavioral/Anomaly Monitoring
– Watches process behavior

– Blocks unusual actions

4. Sandboxing & Emulation


– Runs code in isolated environment

– Observes side effects


Slide 9: Popular Antivirus Products
Vendor Signature Engine Cloud-Assisted Free Tier Key Feature
Bitdefender Yes Yes No Low system impact
Kaspersky Yes Yes Limited Top malware catch
Microsoft Yes Yes Built-in Deep Windows
Defender integration
Avast Yes Yes Yes Extensive free tools
Malwarebytes Heuristic-Heavy Yes Yes Excellent cleanup

Slide 10: Best Practices & Recommendations


• Keep OS & applications up to date

• Enable real-time scanning & automatic updates

• Scan removable media before use

• Backup critical data offline/securely

• Educate users about phishing & suspicious links

• Use multi-layered defense (firewall, EDR, antivirus)

Slide 11: Conclusion


• Viruses remain a persistent threat due to evolving techniques

• Antivirus tools combine signatures, heuristics, behavior analysis

• A holistic security posture (updates, backups, user training) is key

• Stay vigilant—your best defense is an informed user base

Slide 12: Q&A


Any questions?
Thank you!

You might also like