TROJAN HORSE & SALAMI ATTACK

1

to refer to other types of malware. 2 .What is Virus A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. including but not limited to adware and spyware programs that do not have a reproductive ability. but erroneously used.

or harm their host computer systems. Others rely on drive-by downloads in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because the first and many current Trojan horses attempt to appear as helpful programs. steal information. is a standalone malicious program that does not attempt to infect other computers in a completely automatic manner without help from outside forces like other programs and human intervention. Trojan Horse Trojan horses can make copies of them.A Trojan horse. or Trojan. 3 .

4 . sends your credit card numbers and passwords to a stranger.Effect Of Virus ( Trojan Horse ) When you download what appears to be a movie or music file. but when you click on it. or lets that stranger hijack your computer to commit illegal denial of service attacks. you unleash a dangerous program that erases your disks.

can be considered a salami attack.Salami Attack Salami attack is a series of minor data-security attacks that together result in a larger attack. For example a fraud activity in a bank where an employed steals a small amount of funds from several accounts. 5 . Crimes involving salami attacks typically are difficult to detect and trace.

Effect of virus (Salami Attack) The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.g. that deducts a small amount of money from the account of every customer  Why Salami Attacks Persist Computer computations are notoriously subject to small errors involving rounding and truncation. a bank employee inserts a program into the bank's servers. 6 . e. especially when large numbers are to be combined with small ones.

Keep running the virus scanning software until your computer comes up clean. If you have virus-scanning ( anti virus ) software installed. You can get the antivirus from a network administrator or download it from an uninfected computer. run it.How To Prevent Virus As soon as you suspect that your computer has a virus. Start your computer and follow the instructions that came with anti-virus software. If you don’t have antivirus. you’ll need to obtain some. 7 . remove your computer from any networks it might be on as well from the internet.

So.CONCLUSION • The computer virus is a very dangerous when its going to critical situation. 8 . we should prevent our computers from virus.

htnl 9 .htm • http://biometrics.msu.iriscan.edu/fingerprint.Reference • http://www.com/basic.cse.

Virshalini d/o Manimaran Group Member. Athirah Binti Rosli 10 .Done By.

THE END 11 .

Sign up to vote on this title
UsefulNot useful