VIP Model Call Girls Koregaon Park ( Pune ) Call ON 8005736733 Starting From ...
virus
1. IMPACT OF ICT
ON SOCIETY:
VIRUS
(TROJAN HORSE, SALAMI ATTACK).
Presented by: Chai Cheng Fu
2. Content
1. Content
2. Definition of Virus
3. Viruses are spread many by these four ways
4. Example of Virus
5. Trojan Horse
6. Type of Trojan Horse Payloads
7. Denial-of-service attack (DOS)
8. Why Salami Attack Persist?
9. Conclusion
10.Reference
3. Definition of virus
In computer technology, viruses
are malicious software programs,
a form of malware. By definition,
viruses exist on local disk and
spread from one computer to
another through sharing of
“infected” files.
4. Viruses are spread many by these
four ways:
Using a floppy diskette from a machine that has a
virus.
Downloading a file from the Internet (or bulletin
board) that contains a virus.
Getting an email attachment that contains a virus.
Installing software purchased from a store or mail
warehouse. While this is the rarest of the ways,
software vendors have been found to ship their
software with viruses (unknown to them of course)
on the installations diskettes or cd-roms.
5. Trojan horse
Trojan horse is a program that does something
undocumented which the programmer intended, but that
the user would not approve of if he knew about it.
According to some people, a virus is a particular case
of Trojan Horse, namely one that is able to spread to
other programs.
A simple example of a Trojan Horse would be a
program named “waterfalls.scr” claiming to be a free
waterfall screensaver which, when run instead would
allow access to the user’s computer.
6. Trojan Horse payloads are almost always designed to
do various harmful things, but could be harmless.
They are broken down in classification based on how
they breach system and the damage they cause:
The eight main types of Trojan Horse payloads are:
Remote access.
Data destructive email sending.
Downloader.
Proxy Trojan (disguising others as the infected
computer).
FTP Trojan (adding or copying data from the infected
computer).
Security software disabler.
7. Denial-of-service attack (DoS)
URL Trojan (directing the infected computer
to only connect to the Internet via an
expensive dial-up connection).
This attack is used for the commission of
financial crimes.
The key here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed.
E.g: A bank employees inserts a program
into the bank’s serves that deducts a small
amount of money from the account of every
customer.
8. WHY SALAMI ATTACK
PERSIST?
•Computer computations are
notoriously subject to small
errors involving rounding and
truncation, especially when
large number are to be
combined with small ones.
9. CONCLUSIONS
Computer virus can affect
the computer system. It
can copy itself and infect
a computer without
permissions or knowledge
of the user.