Impact of ICT on Society

Computer Virus

Tables of Contents
        Virus… Types of Virus Trojan Horse Salami Attack Virus Deleting Steps Conclusion Sources of Reference Presentation Details

 Is a piece of malicious program that can copy itself and infect a computer without the permission or knowledge of the user.  Has the ability to affect the normal operation of a computer system.

Types of Virus
 Trojan Horse  Salami Attack

Trojan Horse
 Is a malicious program that pretends to be a begin application.  Purposefully does something the user does not expect.  Are not viruses since they do not replicate, but they can be just as destructive.  The name ‘Trojan Horse’ refers to the stratagem that allowed the Greeks to finally enter the city of Troy during the Trojan War.

Salami Attack
 An attack on a computer network.  Involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access.  Would add a small amount to a debit which the account holder would not check.  The name ‘Salami Attack’ comes from the fact that salami is cut into very thin slices which refers to the money in the account being stolen bit by bit.

Trojan Horse  We should install an anti-virus software to protect our machine and make sure that an up-to-date virus signature file has been applied and delete browsing history regularly. Salami Attack  Analyze the source code.  Find indications of an attack.  Random audits.  Don't ignore what appear to be errors in computer.

Sources of Reference
   

Presentation Details
 Made by Mohd Nizam bin Mohammad Zawawy.  Number of slides : 9 (including this)  Number of sources referred : 4 Thank you.