Sei sulla pagina 1di 10

IMPACT OF ICT ON

SOCIETY:
VIRUS (TROJAN HORSE,
SALAMI ATTACK).

Presented by:
Mohamad Shahdan Bin Sulaiman
990602-01-5337
 Definition of virus.
 In computer technology, viruses are malicious
software programs, a form of malware. By definition,
viruses exist on local disk and spread from one
computer to another through sharing of “infected”
files.
 Viruses are spread manly by these four ways:
1. Using a floppy diskette from a machine that has a
virus.
2. Downloading a file from the Internet (or bulletin
board) that contains a virus.
3. Getting an email attachment that contains a virus.
4. Installing software purchased from a store or mail
warehouse. While this is the rarest of the ways,
software vendors have been found to ship their
software with viruses (unknown to them of course)
on the installations diskettes or cd-roms.
 Example of virus:
1. Data diddling.
2. Salami attack.
3. Internet time theft.
4. Logic bomb.
5. Virus/Worm attack.
6. Trojan Horse attack.
7. Cyber pornography.
 Trojan horse is a program that does something
undocumented which the programmer intended,
but that the user would not approve of if he knew
about it.

According to some people, a virus is a particular case


of Trojan Horse, namely one that is able to spread to
other programs.

 A simple example of a Trojan Horse would be a


program named “waterfalls.scr” claiming to be a
free waterfall screensaver which, when run instead
would allow access to the user’s computer.
TYPES OF TROJAN HORSE PAYLOADS.
 Trojan Horse payloads are almost always
designed to do various harmful things, but could
be harmless. They are broken down in
classification based on how they breach system
and the damage they cause:
 The eight main types of Trojan Horse payloads
are:
1. Remote access.
2. Data destructive email sending.
3. Downloader.
4. Proxy Trojan (disguising others as the infected
computer).
5. FTP Trojan (adding or copying data from the
infected computer).
6. Security software disabler.
7. Denial-of-service attack (DoS).
8. URL Trojan (directing the infected computer to
only connect to the Internet via an expensive dial-
up connection).
 This attack is used for the commission of financial
crimes.
 The key here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed.
E.g: A bank employees inserts a program into the
bank’s serves that deducts a small amount of
money from the account of every customer.

WHY SALAMI ATTACK PERSIST?


 Computer computations are notoriously subject to
small errors involving rounding and truncation,
especially when large number are to be combined
with small ones.
 Computer virus can affect the computer system. It
can copy itself and infect a computer without
permissions or knowledge of the user.
 http://www.iriscan.com/basic.htm
 http://www.biometrics.cse.meu.edu/fingerprints.ht
ml
 http://www.i.are.talk.com/htm
 http://www.slideshare.com/htm
 http://www.slideshare.nets/htm
 http://www.heart_of_angel.com/virus(trojanhorse)(
salamiattack).htm

Potrebbero piacerti anche