SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
COMPUTER VIRUS
(TROJAN HORSE & SALAMI
       ATTACK)


       NAME:MUHAMMAD FAIZ BIN NORAZMAN
               CLASS:4 SCIENCE 2
              IC NO:920514-01-5173
WHAT IS COMPUTER
VIRUS ?
   A computer virus is a computer program that can
    copy itself and infect a computer without
    permission or knowledge of the user.
   However, the term "virus" is commonly used,
    albeit erroneously, to refer to many different
    types of malware programs. The original virus
    may modify the copies, or the copies may modify
    themselves, as occurs in a metamorphic virus.
   A virus can only spread from one computer to
    another when its host is taken to the uninfected
    computer, for instance by a user sending it over
    a network or the Internet, or by carrying it on a
    removable medium such as a floppy disk, CD, or
    USB drive.
TROJAN HORSE

   Trojan horse program is a malicious
    program that pretends to be a begin
    application.
   Trojan horse program purposefully does
    something the user does not expect.
   Trojan horse are not viruses since they
    do not replicate, but Trojan horse
    programs can be just as destructive.
   Many people use the term to refer only
    to non-replicating malicious programs,
    thus making a distinction between
    (Trojans and viruses).
SALAMI ATTACK

   Salami attack is a series of minor
    data-security attacks that
    together results in a larger attack.
   For example, a fraud activity in a
    bank where an employed steals a
    small amount of funds from several
    accounts, can be considered a
    salami attack.
   Crimes involving salami attacks
    typically are difficult to detect
    and trace.
EFFECT OF VIRUS
           (TROJAN HORSE)

   When you download what appears
    to be a movie or music file, but
    when you click on it, you unleash a
    dangerous program that erases
    your disk, sends your credit card
    numbers and passwords to a
    stranger, or lets that stranger
    hijack your computer to commit
    illegal denial of service attacks
EFFECT OF VIRUS
          (SALAMI ATTACK)
   Salami attack is a series of minor
    data-security attacks that
    together results in a larger attack.
   For example, a fraud activity in a
    bank where an employee steals a
    small amount of funds from several
    accounts, can be considered a
    salami attack.
   Otherwise, crimes involving salami
    attacks typically are difficult to
    (detect and trace).
HOW TO PREVENT VIRUS

   As soon as you suspect that your
    computer has a virus, remove your
    computer form any networks it might be
    on as well form the internet.
   If you have virus-scanning(anti-virus)
    software installed, run it.
   If you don’t have anti-virus, you’ll need
    to obtain some. You can get the anti-
    virus from a network administrator or
    download it from uninfected computer.
   Start your computer and follow the
    instructions that came with anti-virus
    software.
   Keep running the virus-scanning software
    until your computer come up clean.
CONCLUSION

   The computer virus is very
    dangerous when it going to
    critical. So, we must take care
    our computer from the virus.
   We also must anti-virus.
REFERENCE

   Reference:http://uk.encarta.msn.c
    om/dictionary-trojan horse.html
   Reference:http://www.ehow.com/h
    ow_113706.clean-virus infected
   Reference:http://virus
    informati0n.blogspot.com/2007/06
    /1.html
   Reference:www.wikipediaofcomput
    ervirus.com

Contenu connexe

En vedette

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
siti zulaikha
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In Nigeria
Acapi
 

En vedette (17)

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
The Trojan Horse
The Trojan HorseThe Trojan Horse
The Trojan Horse
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Intellectual Property Crimes CLE
Intellectual Property Crimes CLEIntellectual Property Crimes CLE
Intellectual Property Crimes CLE
 
Virus
VirusVirus
Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Presentation1
Presentation1Presentation1
Presentation1
 
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis KontemporerDiskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In Nigeria
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

19676777 Computer Virus Trojan Horse Salami Attack

  • 1. COMPUTER VIRUS (TROJAN HORSE & SALAMI ATTACK) NAME:MUHAMMAD FAIZ BIN NORAZMAN CLASS:4 SCIENCE 2 IC NO:920514-01-5173
  • 2. WHAT IS COMPUTER VIRUS ?  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus.  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 3. TROJAN HORSE  Trojan horse program is a malicious program that pretends to be a begin application.  Trojan horse program purposefully does something the user does not expect.  Trojan horse are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.  Many people use the term to refer only to non-replicating malicious programs, thus making a distinction between (Trojans and viruses).
  • 4. SALAMI ATTACK  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employed steals a small amount of funds from several accounts, can be considered a salami attack.  Crimes involving salami attacks typically are difficult to detect and trace.
  • 5. EFFECT OF VIRUS (TROJAN HORSE)  When you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks
  • 6. EFFECT OF VIRUS (SALAMI ATTACK)  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack.  Otherwise, crimes involving salami attacks typically are difficult to (detect and trace).
  • 7. HOW TO PREVENT VIRUS  As soon as you suspect that your computer has a virus, remove your computer form any networks it might be on as well form the internet.  If you have virus-scanning(anti-virus) software installed, run it.  If you don’t have anti-virus, you’ll need to obtain some. You can get the anti- virus from a network administrator or download it from uninfected computer.  Start your computer and follow the instructions that came with anti-virus software.  Keep running the virus-scanning software until your computer come up clean.
  • 8. CONCLUSION  The computer virus is very dangerous when it going to critical. So, we must take care our computer from the virus.  We also must anti-virus.
  • 9. REFERENCE  Reference:http://uk.encarta.msn.c om/dictionary-trojan horse.html  Reference:http://www.ehow.com/h ow_113706.clean-virus infected  Reference:http://virus informati0n.blogspot.com/2007/06 /1.html  Reference:www.wikipediaofcomput ervirus.com