Sei sulla pagina 1di 10

VIRUS

( TROJAN HORSE AND SALAMI


ATTACK)

NAME IN GROUP:
MAGDALEN BENJAMIN
MUHD KHAIRIL MARUSIN
RIDZWAN CHOCK CHUEN KEIN
NUR NAJWA SYUHADAH ROSDI
WAN NUR FATIN NAJWA WAN AZIZAN

DEFINITION OF VIRUS
o

A program designed to attach itself to a file,


reproduce and spread from one file to
another, destroying data, displaying an
irriting massage or otherwise disruping
computer operations.

TROJAN HORSE
o

TROJAN HORSE is a program that does something


undocumented which the programmer instended,
but that the user would not approve of if he or she is
new about it.
According to some people, a virus is a particular
case of Trojan Horse, namely onethat is able to
spread to other programs.
A simple of a Trojan Horse would be a program
named waterfalls.scrclaiming to be a free
waterfalls screensaver which, when run instead
would allow access to the users computers.

TYPE OF TROJAN HORSE


PAYLOADS
The main types of trojan horse payloads are:
o Remote access
o Data destructive email sending
o Downloader
o Proxy Trojan ( Disguising other as the
infected computers)
o FTP (Adding or copying data from the
infected computers)
o Secuirity software disabler.

EFFECT OF VIRUS
(TROJAN HORSE)
o

There are no real barnies to what any mind


of malware can do to your machine. If the
programmer wants, it can sit and watch for
creadit card numbers or force you to
reinstall windows and love everything on
the disk.

SALAMI ATTACK
o

A Salami Attack is a series of minor data


security attacks that together result in a
large attack. For example, a frand activity in
a bank where an empoyer steals a small
amount of funds from several accounts, can
be considered a salami attack. Crimes
involving salami attacks typically are
difficult to detect and trace.

THE SALAMI ANALOGY

One perspective depicts taking such thin


slices off end of a salami that there is no
noticeable difference in its oversall size.
The perpetrator, who did the slicing, then
sneaks away with the stolen pieces. From
another angle,the perpetrator deceptively
acquires a whole salami.

EFFECT OF SALAMI ATTACK


o

1.
2.
3.

A salami attack is a series of minor attacks


that together result in a large attack. You
need 3 programs to defend your computer
Anti virus to keep the viruses out (use ONLY
ONE)
Firewall to keep the bad guys out (use
ONLY ONE)
Anti spyware to keep the malware, popup,
password stealers out

CONCLUSION
We must ensure that our software is
constantly updated. In addition, we
also need to choose a reliable anti
virus.

SOURCES OF REFERENCES
1.
2.
3.
4.

http://en.wikipedia.org/wiki/computer_
virus
http://en.wikipedia.org/wiki/Trojan_hor
se
https://answers.yahoo.com/question
/index?qid=20100708141443AAk8
http://en.wikipedia.org/wiki/Salami_slic
ing

Potrebbero piacerti anche