COMPUTER VIRUS
(TROJAN HORSE & SALAMI
       ATTACK)


       NAME:MUHAMMAD FAIZ BIN NORAZMAN
               CLASS:4 SCIEN...
WHAT IS COMPUTER
VIRUS ?
   A computer virus is a computer program that can
    copy itself and infect a computer without...
TROJAN HORSE

   Trojan horse program is a malicious
    program that pretends to be a begin
    application.
   Trojan ...
SALAMI ATTACK

   Salami attack is a series of minor
    data-security attacks that
    together results in a larger atta...
EFFECT OF VIRUS
           (TROJAN HORSE)

   When you download what appears
    to be a movie or music file, but
    whe...
EFFECT OF VIRUS
          (SALAMI ATTACK)
   Salami attack is a series of minor
    data-security attacks that
    togeth...
HOW TO PREVENT VIRUS

   As soon as you suspect that your
    computer has a virus, remove your
    computer form any net...
CONCLUSION

   The computer virus is very
    dangerous when it going to
    critical. So, we must take care
    our comp...
REFERENCE

   Reference:http://uk.encarta.msn.c
    om/dictionary-trojan horse.html
   Reference:http://www.ehow.com/h
 ...
Upcoming SlideShare
Loading in...5
×

19676777 Computer Virus Trojan Horse Salami Attack

10,548
-1

Published on

Published in: Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
10,548
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
390
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

19676777 Computer Virus Trojan Horse Salami Attack

  1. 1. COMPUTER VIRUS (TROJAN HORSE & SALAMI ATTACK) NAME:MUHAMMAD FAIZ BIN NORAZMAN CLASS:4 SCIENCE 2 IC NO:920514-01-5173
  2. 2. WHAT IS COMPUTER VIRUS ?  A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.  However, the term "virus" is commonly used, albeit erroneously, to refer to many different types of malware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus.  A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive.
  3. 3. TROJAN HORSE  Trojan horse program is a malicious program that pretends to be a begin application.  Trojan horse program purposefully does something the user does not expect.  Trojan horse are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.  Many people use the term to refer only to non-replicating malicious programs, thus making a distinction between (Trojans and viruses).
  4. 4. SALAMI ATTACK  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employed steals a small amount of funds from several accounts, can be considered a salami attack.  Crimes involving salami attacks typically are difficult to detect and trace.
  5. 5. EFFECT OF VIRUS (TROJAN HORSE)  When you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks
  6. 6. EFFECT OF VIRUS (SALAMI ATTACK)  Salami attack is a series of minor data-security attacks that together results in a larger attack.  For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack.  Otherwise, crimes involving salami attacks typically are difficult to (detect and trace).
  7. 7. HOW TO PREVENT VIRUS  As soon as you suspect that your computer has a virus, remove your computer form any networks it might be on as well form the internet.  If you have virus-scanning(anti-virus) software installed, run it.  If you don’t have anti-virus, you’ll need to obtain some. You can get the anti- virus from a network administrator or download it from uninfected computer.  Start your computer and follow the instructions that came with anti-virus software.  Keep running the virus-scanning software until your computer come up clean.
  8. 8. CONCLUSION  The computer virus is very dangerous when it going to critical. So, we must take care our computer from the virus.  We also must anti-virus.
  9. 9. REFERENCE  Reference:http://uk.encarta.msn.c om/dictionary-trojan horse.html  Reference:http://www.ehow.com/h ow_113706.clean-virus infected  Reference:http://virus informati0n.blogspot.com/2007/06 /1.html  Reference:www.wikipediaofcomput ervirus.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×