• Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • awsome
    Are you sure you want to
    Your message goes here
    Be the first to like this
No Downloads

Views

Total Views
2,180
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
23
Comments
1
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Virus Trojan Horse & Salami AttackName : Rizwan Razman B. Ahmad NozrinI/C no : 940420-08-****Teacher’s Name :Pn Aenizawati bt. Abdul Samad
  • 2. Contents• Virus• Types Of Virus• Trojan Horse• Salami Attack• Conclusion• Sources Of Reference
  • 3. Virus• In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to another sharing of infected files• It also has the ability to affect the normal operation of a computer system.
  • 4. Types of Virus• Trojan Horse• Salami Attack
  • 5. Trojan Horse• A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system.• The term is derived from the Trojan Horse story in Greek Mythology.
  • 6. Salami Attack• Salami attack is an attack on a computer network.• Involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access.• Would add a small amount to a debit which the account holder would not check.• The name Salami Attack comes from the fact that salami is cut into a very thin slices which refers the money in the account stolen bit by bit.
  • 7. Conclusion• Trojan Horse• We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly.• Salami Attack• Analyze the source code.• Find indications of an attack.• Do not ignore what appear to be errors in computer.
  • 8. Sources of references• www.wikipedia.com• www.google.com• www.yahoo.com