SlideShare a Scribd company logo
1 of 8
Virus Trojan Horse & Salami
            Attack




Name          : Rizwan Razman B. Ahmad Nozrin
I/C no        : 940420-08-****
Teacher’s Name :Pn Aenizawati bt. Abdul Samad
Contents
•   Virus
•   Types Of Virus
•   Trojan Horse
•   Salami Attack
•   Conclusion
•   Sources Of Reference
Virus
• In computer technology, virus are malicious software
  program, a form of malware. By definition, viruses
  exist on local disk and spread from one computer to
  another sharing of infected files


• It also has the ability to affect the normal operation
  of a computer system.
Types of Virus
• Trojan Horse
• Salami Attack
Trojan Horse

• A Trojan horse, is software that appears to
  perform a desirable function for the user
  prior to run or install, but (perhaps in addition
  to the expected function) steals information
  or harms the system.
• The term is derived from the Trojan Horse
  story in Greek Mythology.
Salami Attack
• Salami attack is an attack on a computer network.
• Involves the intruder siphoning off small amounts of money
  from a file and placing them in another file that he or she
  can access.
• Would add a small amount to a debit which the account holder
  would not check.
• The name Salami Attack comes from the fact that salami is
  cut into a very thin slices which refers the money in the
  account stolen bit by bit.
Conclusion

• Trojan Horse
• We should install an antivirus software to protect our
  machine and make sure that an up-to-date virus
  signature file has been applied delete browsing history
  regularly.
• Salami Attack
• Analyze the source code.
• Find indications of an attack.
• Do not ignore what appear to be errors in computer.
Sources of references

• www.wikipedia.com
• www.google.com
• www.yahoo.com

More Related Content

What's hot

What's hot (19)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
virus
  virus  virus
virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Worm
WormWorm
Worm
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Malware
MalwareMalware
Malware
 
Malicious
MaliciousMalicious
Malicious
 
Backdoor
BackdoorBackdoor
Backdoor
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 

Viewers also liked

The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationRizwan Razman
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysiaKesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysiaRizwan Razman
 
Jadual waktu spm 2011 final
Jadual waktu spm 2011 finalJadual waktu spm 2011 final
Jadual waktu spm 2011 finalRizwan Razman
 
The latest open source software available and the latest development in it
The latest open source software available and the latest development in itThe latest open source software available and the latest development in it
The latest open source software available and the latest development in itRizwan Razman
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.Monica Khatri
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our societyBencelle_16
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in societyAnne Perera
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily lifepanitiaict
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technologyRimple Darra
 

Viewers also liked (16)

The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysiaKesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
Kesan penjajahan barat terhadap pentadbiran dan ekonomi di malaysia
 
ICT in Society
ICT in SocietyICT in Society
ICT in Society
 
Kenny g. songbird
Kenny g.   songbirdKenny g.   songbird
Kenny g. songbird
 
Jadual waktu spm 2011 final
Jadual waktu spm 2011 finalJadual waktu spm 2011 final
Jadual waktu spm 2011 final
 
The latest open source software available and the latest development in it
The latest open source software available and the latest development in itThe latest open source software available and the latest development in it
The latest open source software available and the latest development in it
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
Societal Impact Of IT
Societal Impact Of IT Societal Impact Of IT
Societal Impact Of IT
 
The uses of ict in our society
The uses of ict in our societyThe uses of ict in our society
The uses of ict in our society
 
CHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICTCHAP 4 - SOCIAL IMPACT OF ICT
CHAP 4 - SOCIAL IMPACT OF ICT
 
Impact of ICT
Impact of ICTImpact of ICT
Impact of ICT
 
Uses of ict in society
Uses of ict in societyUses of ict in society
Uses of ict in society
 
Usage of ICT in daily life
Usage of ICT in daily lifeUsage of ICT in daily life
Usage of ICT in daily life
 
Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
Usage Of Ict In Every Day Life
Usage Of Ict In Every Day LifeUsage Of Ict In Every Day Life
Usage Of Ict In Every Day Life
 

Similar to Virus, Trojan, and Salami Attack Types

Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet securityhoshmand kareem
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 

Similar to Virus, Trojan, and Salami Attack Types (20)

Computer virus
Computer virusComputer virus
Computer virus
 
Malware
MalwareMalware
Malware
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Presentation1
Presentation1Presentation1
Presentation1
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Virus, Trojan, and Salami Attack Types

  • 1. Virus Trojan Horse & Salami Attack Name : Rizwan Razman B. Ahmad Nozrin I/C no : 940420-08-**** Teacher’s Name :Pn Aenizawati bt. Abdul Samad
  • 2. Contents • Virus • Types Of Virus • Trojan Horse • Salami Attack • Conclusion • Sources Of Reference
  • 3. Virus • In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to another sharing of infected files • It also has the ability to affect the normal operation of a computer system.
  • 4. Types of Virus • Trojan Horse • Salami Attack
  • 5. Trojan Horse • A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. • The term is derived from the Trojan Horse story in Greek Mythology.
  • 6. Salami Attack • Salami attack is an attack on a computer network. • Involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access. • Would add a small amount to a debit which the account holder would not check. • The name Salami Attack comes from the fact that salami is cut into a very thin slices which refers the money in the account stolen bit by bit.
  • 7. Conclusion • Trojan Horse • We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly. • Salami Attack • Analyze the source code. • Find indications of an attack. • Do not ignore what appear to be errors in computer.
  • 8. Sources of references • www.wikipedia.com • www.google.com • www.yahoo.com