Impact of ict on siocety virus

5,530 views
5,267 views

Published on

hoping that this will be the presentation that you search for...

1 Comment
2 Likes
Statistics
Notes
No Downloads
Views
Total views
5,530
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
89
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

Impact of ict on siocety virus

  1. 1. Impact Of ict on society<br />Computer Virus<br />
  2. 2. ContentS<br />Presentation Details<br />Virus<br />Types Of Virus<br />Trojan Horse<br />Salami Attack<br />Conclusion<br />Sources Of Reference<br />
  3. 3. Presentation details<br />Made by:<br />Alvin Cassidy Lajangang<br />Associated by:<br />Nick Walch Walton<br />Pius Kundayis<br />Muazam<br />Jan Eldear<br />Number Of Slides:<br />10 slides<br />
  4. 4. Virus<br />In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to anothersharing of infected files<br />It also has the ability to affect the normal operation of a computer system.<br />
  5. 5. Types of Virus<br />Trojan Horse<br />Salami Attack<br />
  6. 6. Trojan horse<br />A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function)steals information or harms the system.[1]<br />The term is derived from the Trojan Horse story in Greek mythology.<br />
  7. 7. Salami Attack<br />Salami attack is an attack on a computer network.<br />Involves the intrudersiphoning off small amounts of money from a fileand placing them in another file that he or she can access.<br />Would add a small amount to a debit which the account holder would not check.<br />The name Salami Attack comes from the fact that salami is cut into a very thin sliceswhich refers the money in the account stolen bit by bit.<br />
  8. 8. Conclusion<br />Trojan Horse <br />We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly.<br />Salami Attack<br />Analyze the source code.<br />Find indications of an attack.<br />Do not ignore what appear to be errors in computer.<br />
  9. 9. Sources of references<br />http://www.scribd.com/doc/13599022/Impact-of-ICT-on-Society<br />http://en.wikipedia.org/wiki/Salami_slicing<br />http://en.wikipedia.org/wiki/Trojan_horse_(computing)<br />http://www.slideshare.net/Ferellica/virus-trojan-horsesalami-attack-1225194<br />
  10. 10. Thank you<br />Thank you<br />

×