Virus( Trojan Horse and Salami Attack )

VIRUS ( Trojan Horse , Salami Attack

)

Name : Azham Bin Abd Razak I/C Number : 950615-10-5423 Class : 4 Darussalam Teacher s Name : Sir Pahuddin Bin Md Saman

Number 1 2 3 4 4 5 6

Contents The Definition Of Computer Virus The Types Of Computer Viruses The Trojan Horse Salami Attack The Differences Between Worm and Trojan Horse Conclusion The Sources Of Reference

Slide number 3 5 6 7 8 9 10

The Definition Of Computer Virus
‡ Computer security means protecting our computer system and the information they contain against unwanted access , damage , destruction or modification. ‡ A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. ‡ A computer virus may corrupt or delete data on a computer,use an e-mail program to spread the virus to other computers,or even delete everything on the hard disk. ‡ A computer virus also known as computer program that can copy itself and infect a computers. ‡ The term VIRUS is also commonly but erroneously used to refer to other types of malware,including but not limited to adware and spyware programs that do 3 not have the reproductive ability.

‡ Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. ‡ Computer viruses can be disguised as attachments of funny images,greeting cards,or audio and video files. ‡ Computer viruses can be hidden in pirated software or in other files or programs that you may download. ‡ The computer viruses also can spread when it s host is taken to the target computer : for instance because a user sent it over a network or the Internet,or carried it on a removable medium such as a floppy disk,CD,DVD,VCD,or USB drive.
4

The Type Of Computer Viruses
Thera are many types of computer viruses :
‡ File Virus : Most viruses fall into this category.A virus attaches itself to a file , usually a program file. ‡ Boot Sector Virus : These viruses infect floopy and hard drives.The virus program will load first , before the operating system. ‡ Macro Virus : This is a new type of virus that use an application s own macro programming feature to distribute themselves.Unlike other viruses , macro viruses do not infect programs but they infect document. ‡ Virus Hoax : Although there are thousands of viruses discovered each year , there are still some that only exist in the imagination of the public and the press.
5

The Trojan Horse
‡ A Trojan Horse is a destructive program that masquerades as a benign application. ‡ The software initially appers to perform a desirable function for the users prior to installation and or execution , but ( perhaps ini addition to the expected function ) steals information or harms the system. ‡ Unlike viruses or worms , Trojan Horse do not replicate themselves , but they can be just as destructive. ‡ A trojan Horse may allow a hacker remote accsess to a target computer system. ‡ Once a Trojan has been installed , the hacker may have access to the computer remotely and perform various operations , limited by user 6 privilegas on the target computer system and the design of the Trojan.

Salami Attack
‡ This attack is used for the commission of financialcrimes. ‡ The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. ‡ Example , a bank employee inserts a program into the bank's servers, that deducts a small amountof money (say RM 5 a month) from the account ofevery customer. ‡ No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month
7

The Differences Between Worm and Trojan Horse
‡ Viruses are sometime confused with worms and Trojan horse which are technically different. ‡ A worm can exploit security vulneralities to spread itself automatically to other computers through network. ‡ The Trojan Horse is a program that appears harmless but hides malicious functions. ‡ Worms and Trojan Horse , like viruses , may harm a computer system s data or performance. ‡ Some viruses and other malware have symtom noticeable to yhe computer user , but many are surreptitous or simply do nothing to call attention to themselves. ‡ Some viruses do nothing beyond reproducing themselves.
8

Conclusion

‡ In our health conscious society , viruses of any type are an

enemy.Computer viruses are especially pernicious.They can and do strike any unprotected computer system , with results that range from merely annoying to the disastrous.Time consuming anf expensive loss of software and data.And with corporations and increasingly using computer for enterprise-wide , business-critical computing , the cost of viruses induced down time are growing along with the threat.

9

The Sources Of Reference
‡ Internet :

http://en.wikipedia.org/wiki/Computer_virus
‡ Reference book :

Nok A+ Terengganu ICT
‡ Magazine :

PC Malaysia

10

Sign up to vote on this title
UsefulNot useful