You are on page 1of 9

NAMA: MUHAMMAD RIDUWAN BIN YUSOFF KELAS: 4 WIRA

HISTORY VIRUS TYPE OF VIRUS -SALAMI ATTACK -TROJAN HORSE -WORM -LOGIC BOMB RECOVERY METHODS CONCLUSION SOURCES OF REFERENCE

The Creeper worm was an experimental self-replicating program written by Bob Thomas at BBN[1] in 1971. It was designed not to damage but to demonstrate a mobile application. It is generally accepted to be the first computer virus although the notion computer virus didn't exist in 1970s.[2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. The Creeper would start to print a file, but then stop, find another Tenex system, open a connection, pick itself up and transfer to the other machine (along with its external state, files, etc.), and then start running on the new machine, displaying the message. The program rarely if ever actually replicated itself, rather it jumped from one system to another, attempting to remove itself from previous systems as it propagated forward, thus Creeper didn't install multiple instances of itself on several targets, actually it just moseyed around a network.[3]

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executablecode) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD,DVD, or USB drive.[2] Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

In information security, a salami attack is a series of minor attacks that together results in a larger attack. Computers are ideally suited to automating this type of attack. In politics, the term salami tactics has been used since the 1940s to refer to a divide and conquer process of threats and alliances used to overcome opposition. In academium, salami slicing refers to the practice of creating several publications out of material that could have been published in a single journal or review. An example of salami attack, also known as penny shaving, is the fraudulent practice of stealing money repeatedly in extremely small quantities, usually by taking advantage ofrounding to the nearest cent (or other monetary unit) in financial transactions. It would be done by always rounding down, and putting the fractions of a cent into another account. The idea is to make the change small enough that any single transaction will go undetected.[1][2]

A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems", as Cisco describes.[1] The term is derived from the Trojan Horse story in Greek mythology. A Trojan horse may modify the user's computer to display advertisements in undesirable places, such as the desktop or in uncontrollable pop-ups, or it may be less notorious, such as installing a toolbar on to the user's Web browser without prior mentioning. This can create the author of the Trojan revenue, despite it being against the Terms of Service of most major Internet advertising networks, such as Google AdSense.

A computer worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.

Virus can copies itself by copying itself into other programs stored in computer. Deleting files is one of the effect of computer virus. We can choose many types of Anti -virus software such as Kaspersky and AVG antivirus

Internet -http://en .wikipedia.org/wiki/Computer_virus. -http://en .wikipedia.org/wiki/Trojan horse -http://en .wikipedia.org/wiki/Worm

You might also like