Want to create interactive content? It’s easy in Genially!

Get started free

Computer viruses

JOSE LUIS JÍMENEZ MA

Created on November 8, 2023

Computer viruses

Start designing with a free template

Discover more than 1500 professional designs like these:

January School Calendar

Genial Calendar 2026

School Calendar 2026

January Higher Education Academic Calendar

School Year Calendar January

Academic Calendar January

Comic Flipcards

Transcript

Computer viruses

01-

Definition

02-

The first virus

03-

Top 5 historical viruses

04-

Types of viruses

What is a computer virus ?

A virus is a software which purpouse is to alter the regular functionality of a device.

Take as an example the Bonzi Buddy virus, which takes control of your device:

The first ever computer virus

The Creeper virus was the first virus created for the forerunner of internet, Arpanet, in 1971.

The Creeper virus consisted of an informatic programm which jumped across other computers connected to the network. The Creeper was not designed as malware, it was a demostration of how computers could connect and transfer data.

Top 5 historical viruses

Along the history of Internet there has been many viruses whose expansion was very intense and therefore they are very popular.

In the following slides there will be a top of the 5 most well-known viruses that have ever existed.

Number 5

The fifth virus on the list is the Wannacry virus, a encrypted ransomware that affected 150 countries and cost 4 billion $ in damages.

The Wannacry virus was a virus that encrypted information of your computer with a password. The porpouse of it was to extort you in order to have your information back.

Number 5

Number 4

The fourth virus on the list is the ILOVEYOU virus, a worm virus that affected over 50 million pcs and cost 15 billion $ in damages.

The ILOVEYOU virus consisted of a bogus "love letter" that spread across all the e-mails in your computers list. It stole your password and therefore the password of those who you have written to via e-mail.

Number 4

Number 3

The third virus on the list is the Klez virus, a worm virus that affected over 7 million pcs and cost 20 billion $ in damages.

The Klez virus consisted of a worm virus that sent fake emails and activated other virusses in your computer. It could infest files, make copies of itself and spread throughout the users network.

Number 3

Number 2

The second virus on the list is the Sobig virus, a worm virus that affected cost over 30 billion $ in damages.

The Sobig virus hacked the airport systems of many countries in the US, UK, Europe and Asia, but where the damages were more important was in Canada. It was masqueraded as legitimate software (like a trojan), attached to some e-mails.

Number 2

Number 1

The deadliest virus in the history of virusses is the Mydoom virus, a "worm" virus that affected over 100 million users and cost 52 billion $ in damages.

As all of this worm viruses the Mydoom virus was spread by e-mail but it reached a point where 25% of all the e-mails were Mydoom virusses, 3.4 billion fake e-mails were sent a day. It continues up to today and it is in fact the 1% of all the phising e-mails that are sent. Its porpouse was to shut down a server that is unknown.

Number 1

Types of viruses

There isn´t a single type of virus, as we have seen before the deadliest viruses were worms ones with the exception of Wannacry hich was a encrypted ransomware.

However there are up to 10 different types of viruses. In the following slides we will see what are their impact and consequences.

Encrypted viruses, Worms and Trojans

Encrypted viruses are those who encrypt the data of your computer and asks for a password to have it back

Worms are those who spread across e-mails and networks and hides inside the files of your computer and duplicates itself

Trojans viruses are malware disguised as legitimate software so the user downloads it by accident.

Logic bombs, macro-virus and boot viruses

Logic bombs are malware that are not executed unless one or two steps have been realized

Macro-viruses are those virus that can be executed via macro in any type of document such as docs, excels, presentations,...

Boot viruses infect the hard disk of your pc while it is starting. So it needs special antivirus dedicated to hardware instead of software.

Hijackers, hoax, keyloger and mutant or polymorphic viruses

Hoax is an informatic fraud that consists of a flase detetection of a virus or a softwrae malfunction that distracts the user and makes it click and fall for it.

Hijacker viruses hijack software from your computer to modify it. The most common one is the hijacked browser that shows unwished ads.

Keylogers are softwares that register the keys of the keyborad you have pressed. Then that information is send to the hacker and he tracks down the keys that may be passwords.

Mutant or polymorphic viruses are viruses programmed so that they change their appearence and type of file in order to be harder to detect.

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!

¿Tienes una idea?

Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:

  • Visita las preferencias de Analytics;
  • Activa el seguimiento de usuarios;
  • ¡Que fluya la comunicación!