Slide 1: Title
Types of Computer Viruses & Antivirus Solutions
Your Name Deepanshi Date June 2025
Slide 2: Agenda
1. What Is a Computer Virus?
2. Major Virus Categories
3. How Viruses Spread
4. Antivirus: Definition & Techniques
5. Popular Antivirus Products
6. Best Practices & Recommendations
7. Q&A
Slide 3: What Is a Computer Virus?
• Malicious code that attaches itself to host files
• Replicates and spreads when the host file is executed
• Can corrupt, steal or delete data; disrupt system operations
• Part of broader malware family
Slide 4: Major Virus Categories (1/2)
1. File Infector
– Hooks into executables (.exe, .com)
– Activates when program runs
– Example: Cascade, Win32/Sality
2. Boot Sector Virus
– Infects the Master Boot Record (MBR)
– Loads before OS, hard to remove
– Example: Michelangelo, Stone
Slide 5: Major Virus Categories (2/2)
3. Macro Virus
– Targets document macros (Word, Excel)
– Spreads via shared files
– Example: Melissa, Concept
4. Polymorphic/Metamorphic
– Alters own code to evade signatures
– Polymorphic: simple encryption changes
– Metamorphic: rewrites entire body
5. Trojan Horse
– Disguised as legitimate software
– Doesn’t self-replicate
– Provides backdoor
Slide 6: How Viruses Spread
• Email Attachments: Infected documents or executables
• Removable Media: USB drives, external HDDs
• Network Shares & P2P: Shared folders, torrent clients
• Malicious Websites: Drive-by downloads
• Software Vulnerabilities: Unpatched OS or apps
Slide 7: Antivirus Defined
• Software designed to detect, quarantine, and remove malware
• Core components:
1. Scanner (on-demand)
2. Real-Time Shield (on-access)
3. Behavior Monitor
4. Cloud-Based Analysis
Slide 8: Antivirus Techniques
1. Signature-Based Detection
– Matches known virus “fingerprints”
– Fast but misses new threats
2. Heuristic Analysis
– Flags suspicious code patterns
– Reduces zero-day window
3. Behavioral/Anomaly Monitoring
– Watches process behavior
– Blocks unusual actions
4. Sandboxing & Emulation
– Runs code in isolated environment
– Observes side effects
Slide 9: Popular Antivirus Products
Vendor Signature Engine Cloud-Assisted Free Tier Key Feature
Bitdefender Yes Yes No Low system impact
Kaspersky Yes Yes Limited Top malware catch
Microsoft Yes Yes Built-in Deep Windows
Defender integration
Avast Yes Yes Yes Extensive free tools
Malwarebytes Heuristic-Heavy Yes Yes Excellent cleanup
Slide 10: Best Practices & Recommendations
• Keep OS & applications up to date
• Enable real-time scanning & automatic updates
• Scan removable media before use
• Backup critical data offline/securely
• Educate users about phishing & suspicious links
• Use multi-layered defense (firewall, EDR, antivirus)
Slide 11: Conclusion
• Viruses remain a persistent threat due to evolving techniques
• Antivirus tools combine signatures, heuristics, behavior analysis
• A holistic security posture (updates, backups, user training) is key
• Stay vigilant—your best defense is an informed user base
Slide 12: Q&A
Any questions?
Thank you!