Ict Assignment
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • hmm,kalau nak copy........jaga-jaga la.......
    Are you sure you want to
    Your message goes here
  • mcmanar
    Are you sure you want to
    Your message goes here
  • plz...help me...waaa
    Are you sure you want to
    Your message goes here
  • camner nk copy ny???
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
16,027
On Slideshare
16,015
From Embeds
12
Number of Embeds
3

Actions

Shares
Downloads
270
Comments
4
Likes
1

Embeds 12

http://www.slideshare.net 9
https://tasks.crowdflower.com 2
https://twitter.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. IMPACT OF ICT ON SOCIETY VIRUS *TROJAN HORSE *SALAMI ATTACK BY AIN-MARYAM BT. ZOLKIPLI
  • 2. VIRUS A Computer Virus is a computer program which distributes copies of itself, even without permission or knowledge of the user. Computer viruses can spread very fast.
  • 3.
    • Every computer should have anti-virus software on it. Use your anti-virus software to check every file that you receive from another person, especially files received over the Internet or on a diskette.
    • NEVER open attachments to e-mails you receive unless you are expecting them.
    • The following file types are the most dangerous because they contain programs (as opposed to documents). NEVER open attachment with these extensions:
    • ~.exe ~.com ~.scr ~.vbs ~.cmd ~.bat
    • ~.reg
    WAYS TO PREVENT VIRUSES
  • 4.
    • Don't open attachments with no extension at all.
    • On a PC, by default, Windows does not show extensions. File extensions provide information about the type of file. Change this setting so you can see file extensions.
    • All computers should have a software firewall.
    • Never download software from the Internet unless you are sure you know what you are getting
  • 5. Trojan horse is a program that contains or installs a malicious program . The term is derived from the classical myth of the Trojan Horse. Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. TROJAN HORSE
  • 6.
    • A anti-Trojan scanner are available as a tool for prevention. Definite the origin of each program or file you download onto your PC or when you open from you email program.
    • You may occasionally receive email message warning you of any new Trojan horse malware. Unless you recognize the source of where this email is coming from.
    • Regularly check all your files and remove any viruses that are found.
    WAYS TO PREVENT YOUR PC FROM ATTACHING TROJAN HORSE
  • 7. A salami attack is a series of minor data-security attacks that together results in a larger attack. For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack. SALAMI ATTACK
  • 8. The amount of damage a virus can do depends on how much the creator wants to cause. An easy way to stop most viruses is to get an anti virus program. But they cannot always stop everything. Allot of viruses are made to cripple Microsoft programs. Which steers people away from Microsoft. Viruses have improved not only in ways of getting around but also in the damage that they do. Technology has gone a long way and made it easier for these viruses to spread. In the beginning most viruses did not do that much damage and were made out to be pranks and now they have turned into a criminal act. conclusion
  • 9. http://en.wikipedia.org/wiki/Computer_virus http://www.mum.edu/helpdesk/beginners/preventviruses.html http://www.cybertraveler.org/trojan_horse.html source...
  • 10. ~THE END~