computer virus(trojan horse & salami attack)

9
COMPUTER VIRUS COMPUTER VIRUS (TROJAN HORSE & SALAMI (TROJAN HORSE & SALAMI ATTACK) ATTACK) NAME:MUHAMMAD FAIZ BIN NORAZMAN NAME:MUHAMMAD FAIZ BIN NORAZMAN CLASS:4 SCIENCE 2 CLASS:4 SCIENCE 2 IC NO:920514-01-5173 IC NO:920514-01-5173

Upload: muhammad-faiz

Post on 15-Nov-2014

139 views

Category:

Documents


0 download

DESCRIPTION

For Form 4 ICT student...

TRANSCRIPT

Page 1: Computer  Virus(Trojan Horse & Salami Attack)

COMPUTER VIRUSCOMPUTER VIRUS(TROJAN HORSE & SALAMI (TROJAN HORSE & SALAMI

ATTACK)ATTACK)

NAME:MUHAMMAD FAIZ BIN NORAZMANNAME:MUHAMMAD FAIZ BIN NORAZMANCLASS:4 SCIENCE 2CLASS:4 SCIENCE 2

IC NO:920514-01-5173IC NO:920514-01-5173

Page 2: Computer  Virus(Trojan Horse & Salami Attack)

WHAT IS COMPUTER VIRUS WHAT IS COMPUTER VIRUS ?? A A computer viruscomputer virus is a is a computer program that that

can copy itself and infect a computer without can copy itself and infect a computer without permission or knowledge of the user. permission or knowledge of the user.

However, the term "virus" is commonly used, However, the term "virus" is commonly used, albeit erroneously, to refer to many different albeit erroneously, to refer to many different types of malware programs. The original virus types of malware programs. The original virus may modify the copies, or the copies may may modify the copies, or the copies may modify themselves, as occurs in a modify themselves, as occurs in a metamorphic virus. metamorphic virus.

A virus can only spread from one computer to A virus can only spread from one computer to another when its host is taken to the another when its host is taken to the uninfected computer, for instance by a user uninfected computer, for instance by a user sending it over a network or the Internet, or by sending it over a network or the Internet, or by carrying it on a removable medium such as a carrying it on a removable medium such as a floppy disk, CD, or USB drive.floppy disk, CD, or USB drive.

Page 3: Computer  Virus(Trojan Horse & Salami Attack)

TROJAN HORSETROJAN HORSE

Trojan horse program is a malicious Trojan horse program is a malicious program that pretends to be a begin program that pretends to be a begin application. application.

Trojan horse program purposefully does Trojan horse program purposefully does something the user does not expect. something the user does not expect.

Trojan horse are not viruses since they Trojan horse are not viruses since they do not replicate, but Trojan horse do not replicate, but Trojan horse programs can be just as destructive.programs can be just as destructive.

Many people use the term to refer only Many people use the term to refer only to non-replicating malicious programs, to non-replicating malicious programs, thus making a distinction between thus making a distinction between (Trojans and viruses).(Trojans and viruses).

Page 4: Computer  Virus(Trojan Horse & Salami Attack)

SALAMI ATTACKSALAMI ATTACK

Salami attack is a series of minor Salami attack is a series of minor data-security attacks that data-security attacks that together results in a larger together results in a larger attack. attack.

For example, a fraud activity in a For example, a fraud activity in a bank where an employed steals a bank where an employed steals a small amount of funds from small amount of funds from several accounts, can be several accounts, can be considered a salami attack.considered a salami attack.

Crimes involving salami attacks Crimes involving salami attacks typically are difficult to detect typically are difficult to detect and trace.and trace.

Page 5: Computer  Virus(Trojan Horse & Salami Attack)

EFFECT OF VIRUSEFFECT OF VIRUS(TROJAN HORSE)(TROJAN HORSE)

When you download what When you download what appears to be a movie or music appears to be a movie or music file, but when you click on it, file, but when you click on it, you unleash a dangerous you unleash a dangerous program that erases your disk, program that erases your disk, sends your credit card numbers sends your credit card numbers and passwords to a stranger, or and passwords to a stranger, or lets that stranger hijack your lets that stranger hijack your computer to commit illegal computer to commit illegal denial of servicedenial of service attacks attacks

Page 6: Computer  Virus(Trojan Horse & Salami Attack)

EFFECT OF VIRUSEFFECT OF VIRUS(SALAMI ATTACK)(SALAMI ATTACK)

Salami attack is a series of minor Salami attack is a series of minor data-security attacks that data-security attacks that together results in a larger together results in a larger attack. attack.

For example, a fraud activity in a For example, a fraud activity in a bank where an employee steals a bank where an employee steals a small amount of funds from small amount of funds from several accounts, can be several accounts, can be considered a salami attack.considered a salami attack.

Otherwise, crimes involving Otherwise, crimes involving salami attacks typically are salami attacks typically are difficult to (detect and trace).difficult to (detect and trace).

Page 7: Computer  Virus(Trojan Horse & Salami Attack)

HOW TO PREVENT VIRUSHOW TO PREVENT VIRUS

As soon as you suspect that your As soon as you suspect that your computer has a virus, remove your computer has a virus, remove your computer form any networks it might be computer form any networks it might be on as well form the internet. on as well form the internet.

If you have virus-scanning(anti-virus) If you have virus-scanning(anti-virus) software installed, run it. software installed, run it.

If you don’t have anti-virus, you’ll need If you don’t have anti-virus, you’ll need to obtain some. You can get the anti-to obtain some. You can get the anti-virus from a network administrator or virus from a network administrator or download it from uninfected computer. download it from uninfected computer.

Start your computer and follow the Start your computer and follow the instructions that came with anti-virus instructions that came with anti-virus software. software.

Keep running the virus-scanning software Keep running the virus-scanning software until your computer come up clean.until your computer come up clean.

Page 8: Computer  Virus(Trojan Horse & Salami Attack)

CONCLUSIONCONCLUSION

The computer virus is very The computer virus is very dangerous when it going to dangerous when it going to critical. So, we must take critical. So, we must take care our computer from the care our computer from the virus.virus.

We also must anti-virus.We also must anti-virus.

Page 9: Computer  Virus(Trojan Horse & Salami Attack)

REFERENCEREFERENCE

Reference:http://Reference:http://uk.encarta.msn.com/dictionary-uk.encarta.msn.com/dictionary-trojan horse.htmltrojan horse.html

Reference:http://www.ehow.com/Reference:http://www.ehow.com/how_113706.clean-virus infectedhow_113706.clean-virus infected

Reference:http://virus Reference:http://virus informati0n.blogspot.com/2007/06informati0n.blogspot.com/2007/06/1.html/1.html

Reference:www.wikipediaofcompuReference:www.wikipediaofcomputervirus.comtervirus.com