Sei sulla pagina 1di 10

VIRUS ( Trojan Horse , Salami Attack )

Name : Azham Bin Abd Razak I/C Number : 950615-10-5423 Class : 4 Darussalam Teacher s Name : Sir Pahuddin Bin Md Saman

Number 1 2 3 4 4 5 6

Contents The Definition Of Computer Virus The Types Of Computer Viruses The Trojan Horse Salami Attack The Differences Between Worm and Trojan Horse Conclusion The Sources Of Reference

Slide number 3 5 6 7 8 9 10

The Definition Of Computer Virus


Computer security means protecting our computer system and the information they contain against unwanted access , damage , destruction or modification. A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer,use an e-mail program to spread the virus to other computers,or even delete everything on the hard disk. A computer virus also known as computer program that can copy itself and infect a computers. The term VIRUS is also commonly but erroneously used to refer to other types of malware,including but not limited to adware and spyware programs that do 3 not have the reproductive ability.

Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Computer viruses can be disguised as attachments of funny images,greeting cards,or audio and video files. Computer viruses can be hidden in pirated software or in other files or programs that you may download. The computer viruses also can spread when it s host is taken to the target computer : for instance because a user sent it over a network or the Internet,or carried it on a removable medium such as a floppy disk,CD,DVD,VCD,or USB drive.
4

The Type Of Computer Viruses


Thera are many types of computer viruses :
File Virus : Most viruses fall into this category.A virus attaches itself to a file , usually a program file. Boot Sector Virus : These viruses infect floopy and hard drives.The virus program will load first , before the operating system. Macro Virus : This is a new type of virus that use an application s own macro programming feature to distribute themselves.Unlike other viruses , macro viruses do not infect programs but they infect document. Virus Hoax : Although there are thousands of viruses discovered each year , there are still some that only exist in the imagination of the public and the press.
5

The Trojan Horse


A Trojan Horse is a destructive program that masquerades as a benign application. The software initially appers to perform a desirable function for the users prior to installation and or execution , but ( perhaps ini addition to the expected function ) steals information or harms the system. Unlike viruses or worms , Trojan Horse do not replicate themselves , but they can be just as destructive. A trojan Horse may allow a hacker remote accsess to a target computer system. Once a Trojan has been installed , the hacker may have access to the computer remotely and perform various operations , limited by user 6 privilegas on the target computer system and the design of the Trojan.

Salami Attack
This attack is used for the commission of financialcrimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. Example , a bank employee inserts a program into the bank's servers, that deducts a small amountof money (say RM 5 a month) from the account ofevery customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month
7

The Differences Between Worm and Trojan Horse


Viruses are sometime confused with worms and Trojan horse which are technically different. A worm can exploit security vulneralities to spread itself automatically to other computers through network. The Trojan Horse is a program that appears harmless but hides malicious functions. Worms and Trojan Horse , like viruses , may harm a computer system s data or performance. Some viruses and other malware have symtom noticeable to yhe computer user , but many are surreptitous or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.
8

Conclusion

In our health conscious society , viruses of any type are an

enemy.Computer viruses are especially pernicious.They can and do strike any unprotected computer system , with results that range from merely annoying to the disastrous.Time consuming anf expensive loss of software and data.And with corporations and increasingly using computer for enterprise-wide , business-critical computing , the cost of viruses induced down time are growing along with the threat.

The Sources Of Reference


Internet :

http://en.wikipedia.org/wiki/Computer_virus
Reference book :

Nok A+ Terengganu ICT


Magazine :

PC Malaysia

10

Potrebbero piacerti anche