Professional Documents
Culture Documents
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
Trojan horses do not replicate themselves but they can be just as destructive. Must be installed by users or intruders before it can affect the systems assets.
A salami attack is a programmed attack which is implemented in small (meant to be unnoticeable) increments.
It is a malicious code that goes off when a specific condition occurs. It goes off and causes threats at a specified time or date.
Infections spread from machine to machine, and from organisation to organisation. Viruses can be transmitted by: Booting a PC from an infected medium. Executing an infected program. Opening an infected file. Common routes for virus infiltration include: Floppy disks or other media that users can exchange. Email attachments. Pirated software.
Learn the safe computing techniques Manage software piracy Be an educate users Always follow the latest development of virus and antivirus Review situation
http://www.symantec.com/security_response/definitions.p
http://trojan-virus.com/ http://www.irchelp.org/irchelp/security/trojan.html http://www.encyclopedia.com/doc/1O12-salamiattack.html http://all.net/CID/Attack/papers/Salami2.html