1 00:00:13,840 --> 00:00:21,580 Well, as the name suggests, us start learning viruses, anything that happens to a computer which 2 00:00:21,580 --> 00:00:29,000 results in the abnormal behavior, the common man concludes by saying that it's a virus. 3 00:00:29,560 --> 00:00:34,920 Well, if you ask your friend that or even if you tell your friend it, my piece is running slow. 4 00:00:35,350 --> 00:00:42,400 There are unusual pop ups on the screen, he or she, without having a knowledge of cybersecurity. 5 00:00:42,880 --> 00:00:45,150 All these threads with reply virus. 6 00:00:46,090 --> 00:00:54,400 The media has turned this storm into a great they have just exaggerated the virus and people who do 7 00:00:54,400 --> 00:01:00,230 not will know what virus means have started using the term as a common place. 8 00:01:01,120 --> 00:01:05,290 So in this lecture we will actually see what is a virus. 9 00:01:06,010 --> 00:01:13,960 We will see the stages of virus, then we will see how these viruses exactly work and how and the harm 10 00:01:13,960 --> 00:01:14,590 systems. 11 00:01:15,870 --> 00:01:23,620 The news, he hoped was a computer get infected by viruses, but the virus can enter into the system. 12 00:01:24,300 --> 00:01:26,320 So let's get started. 13 00:01:27,510 --> 00:01:28,440 What is a virus? 14 00:01:29,820 --> 00:01:31,900 This is a self replicating program. 15 00:01:32,400 --> 00:01:41,400 Make sure that virus itself like replicating a program that produces itself to another program, computer 16 00:01:41,580 --> 00:01:43,010 sector, a document. 17 00:01:44,070 --> 00:01:51,870 So the characteristics of viruses are it in fact, the programs, it transformed itself that it is still 18 00:01:51,900 --> 00:01:58,650 self replicating program and all those data, it corrupts files and programs. 19 00:02:00,470 --> 00:02:09,420 Viruses are generally transmitted to the downloads, infected discs, flash drives and again, Emile's. 20 00:02:10,810 --> 00:02:14,620 So what can be the purposes of creating viruses? 21 00:02:15,760 --> 00:02:20,620 Well, viruses are created to inflict damage to competitors. 22 00:02:21,250 --> 00:02:29,000 For example, if Amazon and Flipkart are two leading service provider companies and if, let's say, 23 00:02:29,020 --> 00:02:31,410 play cards, still it's going on. 24 00:02:31,420 --> 00:02:33,820 People are choosing move the products. 25 00:02:34,330 --> 00:02:41,440 And a company may deliver a virus or credit card for temporarily disabling the website so that users 26 00:02:41,440 --> 00:02:43,540 have no other option than those in on. 27 00:02:45,340 --> 00:02:51,830 The next is financial benefits, ransomware attacks are the most important point here. 28 00:02:53,050 --> 00:03:00,110 Attackers believe the virus encrypt data and ask for ransom in order to decrypt the data. 29 00:03:01,090 --> 00:03:08,560 If the victim doesn't give money or ransom what they call to their attacker, then that might end up 30 00:03:08,560 --> 00:03:09,550 deleting the data. 31 00:03:11,290 --> 00:03:14,590 The next purpose of creating virus is vandalism. 32 00:03:14,890 --> 00:03:17,680 That is just to, you know, defeat someone. 33 00:03:19,030 --> 00:03:22,600 Then viruses can also be used to play a prank. 34 00:03:23,140 --> 00:03:30,910 For example, Bob is a cool guy and now he knows how to create a virus because of the readily available 35 00:03:30,910 --> 00:03:31,720 virus tools. 36 00:03:32,140 --> 00:03:35,890 He just creates a virus and then sends it to his friend. 37 00:03:35,900 --> 00:03:37,030 It's just a prank. 38 00:03:37,420 --> 00:03:46,600 But again, that prank may result in some harmful actions on the PC then cyber terrorism, like there 39 00:03:46,600 --> 00:03:54,280 are many cyber hacking organizations which are using viruses to destroy our health, healthcare systems, 40 00:03:54,280 --> 00:03:57,840 financial institutions, education institutions and many. 41 00:03:59,230 --> 00:04:07,510 Then distribute political messages, damaged network or computers and gain remote access to the victim's 42 00:04:07,510 --> 00:04:08,050 computer. 43 00:04:08,440 --> 00:04:10,420 What are the stages of a virus like? 44 00:04:11,380 --> 00:04:17,950 The first one is the design developing the virus code, using programming languages or construction 45 00:04:17,950 --> 00:04:18,390 kits. 46 00:04:19,000 --> 00:04:24,010 And that is why, because of these readily available construction kits and even on the Internet, even 47 00:04:24,010 --> 00:04:25,540 you can create a virus. 48 00:04:26,290 --> 00:04:33,520 The next is a replication virus, replicate itself for a period of time within the target system. 49 00:04:33,880 --> 00:04:38,320 And then the predictive power is the launch. 50 00:04:39,310 --> 00:04:46,490 It gets activated with the user performing certain actions such as running and infected programs. 51 00:04:47,680 --> 00:04:49,930 The fourth stage is the detection phase. 52 00:04:50,920 --> 00:04:55,330 Here, the virus is identified as a threat infecting target systems. 53 00:04:56,150 --> 00:04:59,450 Food is the incorporation pardon me. 54 00:04:59,460 --> 00:05:01,750 Fifth is the incorporation. 55 00:05:02,500 --> 00:05:11,380 Antivirus software developers assimilate defenses against the virus and the last one is execute the 56 00:05:11,380 --> 00:05:18,790 damage routine users install virus updates, antivirus updates and eliminate the virus threats. 57 00:05:19,600 --> 00:05:21,310 What is the working of virus? 58 00:05:22,270 --> 00:05:28,540 The working of virus takes place in two phases infection phase and the attack phase. 59 00:05:29,260 --> 00:05:29,680 Right. 60 00:05:30,520 --> 00:05:33,010 Viruses do not directly attack the system. 61 00:05:33,280 --> 00:05:36,400 First is the infect the infected the systems. 62 00:05:36,790 --> 00:05:43,810 Normally a virus infects a person, let's say, up to an incubation period for the computer virus. 63 00:05:44,320 --> 00:05:46,180 It starts attacking the system. 64 00:05:47,200 --> 00:05:49,090 So what happens in the infection phase? 65 00:05:49,690 --> 00:05:57,550 In the infection phase, the virus replicate itself and attaches to an X file in the system, which 66 00:05:57,550 --> 00:05:59,380 is an executable file. 67 00:06:00,250 --> 00:06:08,650 So every time and every time the victim executes the dirty file, the virus might also get executed 68 00:06:09,790 --> 00:06:10,240 attack. 69 00:06:10,250 --> 00:06:19,030 These viruses are programmed with trigger events to activate and current systems trigger even means 70 00:06:19,150 --> 00:06:26,700 whenever the victim clicks or does something, then it will trigger the virus to do something. 71 00:06:27,010 --> 00:06:33,790 It is action somewhere to infect each time they are run and others infect. 72 00:06:33,790 --> 00:06:42,850 Only you in a certain predefined condition is made such as a user's specific task day, a time or a 73 00:06:42,850 --> 00:06:43,840 particular event. 74 00:06:45,040 --> 00:06:53,140 In the next lecture, we will see the indications of virus attacks like how can you know that your PC 75 00:06:53,170 --> 00:06:55,180 has been attacked by a virus? 76 00:06:55,930 --> 00:07:02,050 And then you also see what are the ways in which a computer can get infected by viruses.