You are on page 1of 14

( TROJAN HORSE AND SALAMI ATTACK )

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

Viruses can also replicate themselves.

Trojan horses do not replicate themselves but they can be just as destructive. Must be installed by users or intruders before it can affect the systems assets.

A salami attack is a programmed attack which is implemented in small (meant to be unnoticeable) increments.

It is a malicious code that goes off when a specific condition occurs. It goes off and causes threats at a specified time or date.

A program that copies and spreads itself through network.

Infections spread from machine to machine, and from organisation to organisation. Viruses can be transmitted by: Booting a PC from an infected medium. Executing an infected program. Opening an infected file. Common routes for virus infiltration include: Floppy disks or other media that users can exchange. Email attachments. Pirated software.

Some of the effects are:

corrupt system files


damage boot sector

It can slow down computer


make some programs faulty

Applications don't work correctly


steal important information from computer Computer hang frequently or display erratic error messages

WAYS TO PREVENT THE VIRUS


Only execute programs you are familiar to their origin. Load only software from original disks or CD's. Password protection should be employed. Check all shareware and free programs downloaded From on-line services with a virus checking program. Purchase or download anti-virus. Boot or work your computer. Up-date it frequently;

BitDefender Antivirus 2012


Norton Antivirus 2012 Perfect Antivirus 2012 Vipre Antivirus 2012 ESET Antivirus 2012

Kaspersky Antivirus 2012


F-Secure Antivirus 2012 TrendMicro Antivirus 2012 ZoneAlarm Antivirus 2012 Panda Antivirus 2012

Learn the safe computing techniques Manage software piracy Be an educate users Always follow the latest development of virus and antivirus Review situation

1. ICT MODULE FORM 4 2. INTERNET


http://www.myfreeantivirusdownload.com/viruses/computervirus-software-thats-not-downloaded/ http://home.mcafee.com/VirusInfo/VirusMap.aspx http://www.slideshare.net/adni_shadah/computer-viruses 76982

http://www.symantec.com/security_response/definitions.p
http://trojan-virus.com/ http://www.irchelp.org/irchelp/security/trojan.html http://www.encyclopedia.com/doc/1O12-salamiattack.html http://all.net/CID/Attack/papers/Salami2.html

You might also like