0% found this document useful (0 votes)
37 views18 pages

Eshwar Document

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views18 pages

Eshwar Document

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

A Micro Project report on

VIRUS, WORMS, ATTACKS AND THREATS

Submitted to the CMR Institute of Technology in partial fulfilment of the

requirement for the

INFORMATION TECHNOLOGY

of

I-B. Tech I-Semester in FRESHMAN ENGINEERING DEPARTMENT

Submitted by

B.Eshwar (24R01A6771)
B.Anil Kumar (24R01A6772)
B.Pooja (24R01A6773)
B.Gokul Vahari (24R01A6774)
B.Rajinika (24R01A6775)
B.Chaitra (24R01A6776 )

Under the Guidance of

Mr. I. Ranaveer

(Assistant Professor, Freshman Engineering Dept)

CMR INSTITUTE OF TECHNOLOGY

(UGC AUTONOMOUS) (Approved by AICTE, Affiliated to JNTU,

Kukatpally, Hyderabad)Kandlakoya, Medchal Road, Hyderabad

2024-2025
CMR INSTITUTE OF TECHNOLOGY

(UGC AUTONOMUS)

(Approved by AITCE, Affiliated to JNTU, Kukatpally, Hyderabad)

Kandlakoya, Medchal Road, Hyderabad.

Department of Freshman Engineering

CERTIFICATE

This is to certify that a Micro Project entitled with:

“VIRUS, WORMS,ATTACKS AND THREATS”

is being

Submitted by

B.Eshwar (24R01A6771)
B.Anil Kumar (24R01A6772)
B.Pooja (24R01A6773)
B.Gokul Vahari (24R01A6774)
B.Rajinika (24R01A6775)
B.Chaitra (24R01A6776 )

Has successfully completed their micro project work during the academic year 2024-2025 at CSD
department of CMRIT, Hyderabad. The implementation of this project was Co-ordinated in our premises
by efforts of them in executing the project are commendable and the project is completed within the
time frame.

Signature of faculty Signature of HOD


MR.I.Ranaveer Dr.M.RadhakrishnReddy
(Asst.prof.CSE Dept) (Head of Department)
ACKNOWLEDGEMENT

We are extremely grateful to Director Dr. M. Janga Reddy, Principal Dr. G.Madhusudhana Rao and
Dr.M.Radhakrishna Reddy Head of Department Dept of Freshman Engineering, CMR Institute of
Technology for their inspiration and valuable guidance during entire duration.

We are extremely thankful to Mr. I. Ranaveer, Assistant professor of Information Technology, CSD
department, CMR Institute of Technology for him constant guidance encouragement and moral support
throughout the project.

We express our thanks to all staff members and friends for all the help and coordination extended in
bringing out this micro project successfully in time.

Finally, we are very much thankful to our parents and relatives who guided directly or indirectly for
successful completion of the project.

B.Eshwar (24R01A6771)
B.Anil Kumar (24R01A6772)
B.Pooja (24R01A6773)
B.Gokul Vahari (24R01A6774)
B.Rajinika (24R01A6775)
B.Chaitra (24R01A6776)
INDEX

SL.NO CONTENT PAGE NO

1. ABTRACT
2. INTRODUCTION
3. VIRUSES
4. WORMS
5. ATTACKS
6. THREATS
7. CONCLUSION
ABSTRACT
This project presents about the types of attacks, threats, malwares, and warm
attacks and also
I tell about how to prevent our PC’s , laptops and mobile phones from this
attacks, threats and
warms plotting and also we mentioned that the points to prevent our devices
from this attacks
and viruses from anonymous hackers
Virus:-Virus stands for VITAL INFORMATION RESOURCES UNDER SIEZE. It refers
to the
type of malicious software or malware that can cause damage to your data, files,
and software
through replication
Attacks:-There are many varieties of attacks that happen in the world today. If
we know the
various types of attacks, it becomes easier for us to protect our networks and
systems against
them. Here, we will closely examine the top ten cyber-attacks that can affect an
individual, or a
large business, depending on the scale.
Threats:-Threats are potential risks or dangers that may harm individuals,
organizations, or
systems. In the context of information security, threats refer to anything that
has the potential to
cause harm to computer systems, networks, or data.
Worms:- Threats are potential risks or dangers that may harm individuals,
organizations, or
systems. In the context of information security, threats refer to anything that
has the potential to
cause harm to computer systems, networks, or data.
In this above mentioned things we discussed briefly about
 Virus
 Attacks
 Threats
 worms 2
INTRODUCTION
A computer virus is a kind of malicious computer program, which when
executed, replicates itself
and inserts its own code, which spreads a harmful virus in the system. This
computer virus
ultimately affects the functioning and programming of the device. A computer
worm is a subset
of the Trojan horse malware that can propagate or self-replicate from one
computer to another
without human activation after breaching a system. Typically, a worm spreads
across a network
through your internet or LAN (Local Area Network) connection. A computer
threat is a term that
relates to the security of a computer system being compromised.
VIRUS
Virus stands for VITAL INFORMATION RESOURCES UNDER SIEZE. It refers to the
type of
malicious software or malware that can cause damage to your data, files, and
software through
replication
A computer virus is a type of computer program that, when executed, replicates
itself by modifying
other computer programs and inserting its own code into those programs. If this
replication
succeeds, the affected areas are then said to be "infected" with a computer
virus, a metaphor
derived from biological viruses.
Computer viruses aim to disrupt systems, cause major operational issues, and
result in data loss
and leakage. A key thing to know about computer viruses is that they are
designed to spread across
programs and systems. Computer viruses typically attach to an executable host
file, which results
in their viral codes executing when a file is opened. The code then spreads from
the do
software it is attached to via networks, drives, file-sharing programs, or infected
email attachments
threat can lead to cyber-attacks and data being stolen , lost or edited . The
threat could be caused
by poor information security practices or a ‘backdoor’ in the code of the system.
TYPES OF COMPUTER VIRUSES
There are several types of computer viruses that can infect devices. This section
will cover
computer virus protections and how to get rid of computer viruses.
 Resident Virus
 Multipartite Virus
 Direct Action
 Browser Hijacker
 Overwrite Virus
 Web Scripting Virus
 File Infector
 Network Virus
 Boot Sector Virus
34
We’ve all been annoyed with pop-ups, spam emails and all those nuisances that
we encounter
while browsing the Internet. But computer viruses are far from simply annoying.
While a virus making its way onto your computer isn’t necessarily the worst
thing that can
happen, they are continuously present and can spread fast through a network,
infecting other
computers and wrecking havoc once they get momentum. Any sensitive and
confidential
information that you store and transmit through your network can be
compromised. Educating
our clients on how to avoid viruses in the first place can make a far greater
impact than simply
patching them up after an infection.
 Keep your computer up to date
 Don’t use Internet Explorer
 Avoid suspicious web sites
 Always scan email attachment
5
WORMS
A worm is a harmful software (virus) that repeats itself as it moves from
computer to computer,
leaving copies of itself in each computer's memory. A worm finds a computer's
vulnerability and
spreads like an illness throughout its associated network, constantly looking for
new holes.
Worms, like viruses, are spread by email attachments from seemingly
trustworthy senders.
Worms then propagate through a user's email account and address book to
contacts.
Some worms reproduce and then go dormant, while others inflict harm. The
worm's code is
referred to as payload in such circumstances.
How do they work?
Computer worms make use of network flaws to spread. The worm is hunting for
an unobserved
back door into the network. To spread computer worms for the first time,
hackers usually send
phishing emails or instant chats with malicious attachments. The worm is
disguised by cyber
thieves so that the recipient is willing to run it. For this aim, duplicate file
extensions and a data
name that appears harmless or urgent, such as "invoice," are utilized. When the
user opens the
attachment or clicks on the link, the malware (computer worm) will be
downloaded into their
system or lead to a harmful website.
How does a computer worm spread?
 Phishing: Fraudulent emails that look authentic can carry worms in corrupt
attachments.
Such emails may also invite users to click malicious links or visit websites
designed to infect
users with worms.
 Spear-Phishing: Targeted phishing attempts can carry dangerous malware like
ransomware crypto worms.
 Networks: Worms can self-replicate across networks via shared access.
 Security holes: Some worm variants can infiltrate a system by exploiting
software
vulnerabilities.
 File sharing: P2P file networks can carry malware like worms.
 Social networks: Social platforms like My Space have been affected by certain
types of
worms.
 Instant messengers (IMs): All types of malware, including worms, can spread
through text
messages and IM platforms such as Internet Relay Chat (IRC).
 External devices: Worms can infect USB sticks and external hard drive.6
What does a computer worm do?
Once a computer worm has breached your computer’s defenses it can perform
several malicious
actions:
 Drop other malware like spyware or ransomware
 Consume bandwidth
 Delete files
 Overload networks
 Steal data
 Open a backdoor
Symptoms of a computer worm:
Many of the symptoms of a computer worm are like that of a computer virus.
For example, you
may have a computer worm if your computer slows down, freezes, crashes or
throws up error
messages. You may also notice that files are missing or corrupted or that your
hard drive's space
is rapidly depleting inexplicably. Additionally, you may see alerts from your
firewall about a
breach.
How to stop computer worms:
Like other forms of malware — computer worms can be stopped with the right
antivirus and
anti-malware software and safe computing practices. Please don’t entertain
suspicious links,
emails, texts, messages, websites, P2P file networks, and drives. Also, update
your essential
software regularly to shield your computer from vulnerabilities like the
warmable windows flaw.ATTACKS
Life today has become far more comfortable because of various digital devices
and the internet
to support them. There is a flip side to everything good, and that also applies to
the digital world
today. The internet has brought in a positive change in our lives today, but with
that, there is also
an enormous challenge in protecting your data. This gives rise to cyber attacks.
In this article, we
will discuss the different types of cyber attacks and how they can be prevented.
What is a Cyber Attack?
Cyber-attacks have several negative effects. When an attack is carried out, it can
lead to data
breaches, resulting in data loss or data manipulation. Organizations incur
financial losses,
customer trust gets hampered, and there is reputational damage. To put a curb
on cyber attacks,
we implement cyber security. Cyber security is the method of safeguarding
networks, computer
systems, and their components from unauthorized digital access.
Types of Cyber Attack:
Let’s start with the different types of cyber attacks on our list:
1. Malware Attack:
This is one of the most common types of cyber attacks. “Malware” refers to
malicious software
viruses including worms, spyware, ransomware, adware, and trojans.
Malware breaches a network through a vulnerability. When the user clicks a
dangerous link, it
downloads an email attachment or when an infected pen drive is used.
Let’s now look at how we can prevent a malware attack:
 Use antivirus software.
 Use firewalls.
 Stay alert and avoid clicking on suspicious links.
 Update your OS and browsers, regularly.
72. Phishing Attack:
Phishing attacks are one of the most prominent widespread types of cyber
attacks. It is a type of
social engineering attack where an attacker impersonates to be a trusted contact
and sends the
victim fake mails. They can also install malware through a phishing attack.
Phishing attacks can be prevented by following the below-mentioned steps:
 Make use of an anti-phishing toolbar.
 Update your passwords regularly.
3. Password Attack:
It is a form of attack wherein a hacker cracks your password with various
programs and
password cracking tools like Air crack, Cain, Abel, John the Ripper, Hash cat, etc.
There are
different types of password attacks like brute force attacks, dictionary attacks,
and key logger
attacks.
Listed below are a few ways to prevent password attacks:
 Use strong alphanumeric passwords with special characters.
 Abstain from using the same password for multiple websites or accounts.
 Update your passwords; this will limit your exposure to a password attack.
 Do not have any password hints in the open.
4. Man-in-the-Middle Attack
A Man-in-the-Middle Attack (MITM) is also known as an eavesdropping attack.
In this attack,
an attacker comes in between a two-party communication, i.e., the attacker
hijacks the session
between a client and host. By doing so, hackers steal and manipula

As seen below, the client-server communication has been cut off, and instead,
the
communication line goes through the hacker.
MITM attacks can be prevented by following the below-mentioned steps:
 Be mindful of the security of the website you are using. Use encryption on
your devices.
 Refrain from using public Wi-Fi networks.
5. SQL Injection Attack
A Structured Query Language (SQL) injection attack occurs on a database-driven
website when
the hacker manipulates a standard SQL query. It is carried by injecting a
malicious code into a
vulnerable website search box, thereby making the server reveal crucial
information.
This results in the attacker being able to view, edit, and delete tables in the
databases. Attackers
can also get administrative rights through this.
To prevent a SQL injection attack:
 Use an Intrusion detection system, as they design it to detect unauthorized
access to a
network.
 Carry out a validation of the user-supplied data. With a validation process, it
keeps the
user input in check.
How to Prevent Cyber Attacks?
Although we had a look at several ways to prevent the different types of cyber
attacks we
discussed, let's summarize and look at a few personal tips which you can adopt
to avoid a cyber
attack on the whole.
1.Change your passwords regularly and use strong alphanumeric passwords
which are difficult to
crack. Refrain from using too complicated passwords that you would tend to
forget. Do not use
the same password twice.
92. Update both your operating system and applications regularly. This is a
primary prevention
method for any cyber attack. This will remove vulnerabilities that hackers tend
to exploit. Use
trusted and legitimate Anti-virus protection software.
3.Use a firewall and other network security tools such as Intrusion prevention
systems, Access
control, Application security, etc.
4.Avoid opening emails from unknown senders.
5.Make use of a VPN. This makes sure that it encrypts the traffic between the
VPN server and
your device.
6.Regularly back up your data.
7.Employees should be aware of cyber security principles. They must know the
various types of
cyber attacks and ways to tackle them.
8. Use Two-Factor or Multi-Factor Authentication. With two-factor
authentication, it requires
users to provide two different authentication factors to verify themselves.
1011
THREATS
The threat is not a security problem that exists in an implementation or
organization. Instead it is
something that can violate the security. This can be compared to a vulnerability
which is an
actual weakness that can be exploited. The threat always exist, regardless of any
countermeasures. However, countermeasures can be used to minimize the
probability of it being
realized.
TYPES OF SECURITY THREATS:
The NIST definition above states that a threat can be an event or a condition. An
event, in this
case, also includes natural disasters, fire, and power outage. It is a very general
concept. In cyber
security, it is more common to talk about threats such as viruses, trojan horses,
CONCLUSION
1-Keep The Operating System Updated
2- Use a Firewall
You should also install a firewall. A firewall is a system that prevents
unauthorized use and access
to your computer. A firewall can be either hardware or software. Hardware
firewalls provide a
strong degree of protection from most forms of attack coming from the outside
world and can be
purchased as a stand possibly ignore embedded worms in outgoing e-mails -
alone product or in
broadband routers. Unfortunately, when battling viruses, worms and Trojans, a
hardware firewall
may be less effective than a software firewall, as it could and see this as regular

You might also like