Virus Trojan Horse & Salami AttackName : Rizwan Razman B. Ahmad NozrinI/C no : 940420-08-****Teacher’s Name :Pn Aenizawati bt. Abdul Samad
Contents• Virus• Types Of Virus• Trojan Horse• Salami Attack• Conclusion• Sources Of Reference
Virus• In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to another sharing of infected files• It also has the ability to affect the normal operation of a computer system.
Trojan Horse• A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.• The term is derived from the Trojan Horse story in Greek Mythology.
Salami Attack• Salami attack is an attack on a computer network.• Involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access.• Would add a small amount to a debit which the account holder would not check.• The name Salami Attack comes from the fact that salami is cut into a very thin slices which refers the money in the account stolen bit by bit.
Conclusion• Trojan Horse• We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly.• Salami Attack• Analyze the source code.• Find indications of an attack.• Do not ignore what appear to be errors in computer.
Sources of references• www.wikipedia.com• www.google.com• www.yahoo.com