Nik Ahmad Faisal Mohd Kamarolzaman 4 Ibn Rushd

Introduction Content Conclusion Reference


computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner  Since the first PC virus was found in 1986, the total number of virus has been rocketing to an enormous figure. As many may have known, computer virus is a piece of malicious program which is able to affect the normal operation of a computer system.


Worms are viruses that reside in the active memory of a computer and duplicate themselves. They may send copies of themselves to other computers, such as through email or Internet Relay Chat (IRC).

 •A

Trojan horse program is a malicious program that pretends to be a begin application; a Trojan horse program purposefully does something the user does not expect. Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.  Many people use the term to refer only to non-replicating malicious programs, thus making a distinction between Trojans and viruses.

The seven main types of Trojan horses are:  1)Remote Access Trojans  Abbreviated as RATs, a Remote Access Trojan is one of seven major types of Trojan horse designed to provide the attacker with complete control of the victim's system. Attackers usually hide these Trojan horses in games and other small programs that unsuspecting users then execute on their PCs.
  2)

Destructive Trojans:  A type of Trojan horse designed to destroy and delete files, and is more like a virus than any other Trojan.

 3)Data Sending Trojans :  A type of a Trojan horse

that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. These Trojans can look for specific pre-defined data (e.g., just credit card information or passwords), or they could install a keylogger and send all recorded keystrokes back to the attacker.  4) Proxy Trojans  proxy server. This gives the attacker the opportunity to do everything from your computer, including the possibility of conducting credit card fraud and other illegal activities, or even to use your system to launch malicious attacks against other networks.  5) FTP Trojans :  A type of Trojan horse designed to open port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP).

 This

attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money (say Rs.5 a month) from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

We should install a genuine anti-virus software to protect our computer and make sure that an upto-date virus signature file has been applied.  Do backup your programs and data regularly  Do check floppy disks and files downloaded from Internet (especially those from unknown origin) with anti-virus software before use  Don't use illegal software under all circumstances  Scan the drives at least once a week  Scan every file on removable drive before copying them into your computer.

 

search for

‘computer virus’  search for ‘computer virus’