SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
COMPUTER VIRUS
(TROJAN HORSE & SALAMI
       ATTACK)


       NAME:MUHAMMAD FAIZ BIN NORAZMAN
               CLASS:4 SCIENCE 2
              IC NO:920514-01-5173
WHAT IS COMPUTER
VIRUS ?
   A computer virus is a computer program that can
    copy itself and infect a computer without
    permission or knowledge of the user.
   However, the term "virus" is commonly used,
    albeit erroneously, to refer to many different
    types of malware programs. The original virus
    may modify the copies, or the copies may modify
    themselves, as occurs in a metamorphic virus.
   A virus can only spread from one computer to
    another when its host is taken to the uninfected
    computer, for instance by a user sending it over
    a network or the Internet, or by carrying it on a
    removable medium such as a floppy disk, CD, or
    USB drive.
TROJAN HORSE

   Trojan horse program is a malicious
    program that pretends to be a begin
    application.
   Trojan horse program purposefully does
    something the user does not expect.
   Trojan horse are not viruses since they
    do not replicate, but Trojan horse
    programs can be just as destructive.
   Many people use the term to refer only
    to non-replicating malicious programs,
    thus making a distinction between
    (Trojans and viruses).
SALAMI ATTACK

   Salami attack is a series of minor
    data-security attacks that
    together results in a larger attack.
   For example, a fraud activity in a
    bank where an employed steals a
    small amount of funds from several
    accounts, can be considered a
    salami attack.
   Crimes involving salami attacks
    typically are difficult to detect
    and trace.
EFFECT OF VIRUS
           (TROJAN HORSE)

   When you download what appears
    to be a movie or music file, but
    when you click on it, you unleash a
    dangerous program that erases
    your disk, sends your credit card
    numbers and passwords to a
    stranger, or lets that stranger
    hijack your computer to commit
    illegal denial of service attacks
EFFECT OF VIRUS
          (SALAMI ATTACK)
   Salami attack is a series of minor
    data-security attacks that
    together results in a larger attack.
   For example, a fraud activity in a
    bank where an employee steals a
    small amount of funds from several
    accounts, can be considered a
    salami attack.
   Otherwise, crimes involving salami
    attacks typically are difficult to
    (detect and trace).
HOW TO PREVENT VIRUS

   As soon as you suspect that your
    computer has a virus, remove your
    computer form any networks it might be
    on as well form the internet.
   If you have virus-scanning(anti-virus)
    software installed, run it.
   If you don’t have anti-virus, you’ll need
    to obtain some. You can get the anti-
    virus from a network administrator or
    download it from uninfected computer.
   Start your computer and follow the
    instructions that came with anti-virus
    software.
   Keep running the virus-scanning software
    until your computer come up clean.
CONCLUSION

   The computer virus is very
    dangerous when it going to
    critical. So, we must take care
    our computer from the virus.
   We also must anti-virus.
REFERENCE

   Reference:http://uk.encarta.msn.c
    om/dictionary-trojan horse.html
   Reference:http://www.ehow.com/h
    ow_113706.clean-virus infected
   Reference:http://virus
    informati0n.blogspot.com/2007/06
    /1.html
   Reference:www.wikipediaofcomput
    ervirus.com

Más contenido relacionado

Destacado

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
siti zulaikha
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In Nigeria
Acapi
 

Destacado (17)

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
The Trojan Horse
The Trojan HorseThe Trojan Horse
The Trojan Horse
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Intellectual Property Crimes CLE
Intellectual Property Crimes CLEIntellectual Property Crimes CLE
Intellectual Property Crimes CLE
 
Virus
VirusVirus
Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Presentation1
Presentation1Presentation1
Presentation1
 
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis KontemporerDiskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In Nigeria
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

19676777 Computer Virus Trojan Horse Salami Attack

  • 1. COMPUTER VIRUS (TROJAN HORSE & SALAMI ATTACK) NAME:MUHAMMAD FAIZ BIN NORAZMAN CLASS:4 SCIENCE 2 IC NO:920514-01-5173
  • 2. WHAT IS COMPUTER VIRUS ?  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus.  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  • 3. TROJAN HORSE  Trojan horse program is a malicious program that pretends to be a begin application.  Trojan horse program purposefully does something the user does not expect.  Trojan horse are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.  Many people use the term to refer only to non-replicating malicious programs, thus making a distinction between (Trojans and viruses).
  • 4. SALAMI ATTACK  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employed steals a small amount of funds from several accounts, can be considered a salami attack.  Crimes involving salami attacks typically are difficult to detect and trace.
  • 5. EFFECT OF VIRUS (TROJAN HORSE)  When you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks
  • 6. EFFECT OF VIRUS (SALAMI ATTACK)  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack.  Otherwise, crimes involving salami attacks typically are difficult to (detect and trace).
  • 7. HOW TO PREVENT VIRUS  As soon as you suspect that your computer has a virus, remove your computer form any networks it might be on as well form the internet.  If you have virus-scanning(anti-virus) software installed, run it.  If you don’t have anti-virus, you’ll need to obtain some. You can get the anti- virus from a network administrator or download it from uninfected computer.  Start your computer and follow the instructions that came with anti-virus software.  Keep running the virus-scanning software until your computer come up clean.
  • 8. CONCLUSION  The computer virus is very dangerous when it going to critical. So, we must take care our computer from the virus.  We also must anti-virus.
  • 9. REFERENCE  Reference:http://uk.encarta.msn.c om/dictionary-trojan horse.html  Reference:http://www.ehow.com/h ow_113706.clean-virus infected  Reference:http://virus informati0n.blogspot.com/2007/06 /1.html  Reference:www.wikipediaofcomput ervirus.com