0
ViRuS Name : Ahmad Syahir bin Sobri Class : 5 Adil
Viruses <ul><li>A virus is an infectious program which affects computer systems and data. Viruses are spread to any other ...
Trojan Horses <ul><li>A trojan horse is a program with hidden functionality. An example is a program which captures passwo...
Types of Trojan horses   <ul><li>Trojan horses are almost always designed to do various harmful things, but could be harml...
The Impact of Trojan Horse <ul><li>erasing or overwriting data on a computer.  </li></ul><ul><li>encrypting files in a  cr...
Computer worm   <ul><li>A  computer worm  is a self-replicating  computer program . It uses a network to send copies of it...
Types of computer worms   <ul><li>Email Worms </li></ul><ul><li>Instant Messaging Worms </li></ul><ul><li>IRC Worms </li><...
Conclusion <ul><li>As stated above, computer viruses are a major threat to business information system because they cause ...
Refrence <ul><li>www. wikipiedia .com </li></ul><ul><li>www.yahoo.com </li></ul><ul><li>www. gogle .com </li></ul>
<ul><li>leukemia virus   </li></ul><ul><li>Abelson murine  leukemia virus   </li></ul><ul><li>Abelson's virus   </li></ul>...
Upcoming SlideShare
Loading in...5
×

Ahmad Pussycat Dolls

2,522

Published on

saja test....

Published in: Technology
2 Comments
2 Likes
Statistics
Notes
No Downloads
Views
Total Views
2,522
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
164
Comments
2
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Ahmad Pussycat Dolls"

  1. 1. ViRuS Name : Ahmad Syahir bin Sobri Class : 5 Adil
  2. 2. Viruses <ul><li>A virus is an infectious program which affects computer systems and data. Viruses are spread to any other programs they contact, thus being infectious. A virus will attach a copy of itself to an executable program. </li></ul><ul><li>Viruses usually consist of a reproduction mechanism, a trigger mechanism, and an action. </li></ul><ul><li>Both malicious and benign viruses exist. Benign viruses are used for maintenance and for compression. </li></ul>
  3. 3. Trojan Horses <ul><li>A trojan horse is a program with hidden functionality. An example is a program which captures passwords secretly. Trojan horses can occur by being buried in object code or by modifying existing source code. </li></ul><ul><li>Trojan horses may be encrypted or scattered throughout a program, making it difficult to detect. </li></ul>
  4. 4. Types of Trojan horses <ul><li>Trojan horses are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: </li></ul><ul><ul><li>Remote Access Trojans </li></ul></ul><ul><ul><li>Data Sending Trojans </li></ul></ul><ul><ul><li>Destructive Trojans </li></ul></ul><ul><ul><li>Proxy Trojans </li></ul></ul><ul><ul><li>FTP Trojans </li></ul></ul><ul><ul><li>Security software disabler Trojans </li></ul></ul><ul><ul><li>denial-of-service attack (DoS) Trojans </li></ul></ul><ul><ul><li>URL Trojans </li></ul></ul>
  5. 5. The Impact of Trojan Horse <ul><li>erasing or overwriting data on a computer. </li></ul><ul><li>encrypting files in a cryptoviral extortion attack. </li></ul><ul><li>corrupting files in a subtle way. </li></ul><ul><li>upload and download files. </li></ul><ul><li>allowing remote access to the victim's computer. This is called a RAT. ( remote administration tool ) </li></ul>
  6. 6. Computer worm <ul><li>A computer worm is a self-replicating computer program . It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. </li></ul><ul><li>Unlike a virus , it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer </li></ul>
  7. 7. Types of computer worms <ul><li>Email Worms </li></ul><ul><li>Instant Messaging Worms </li></ul><ul><li>IRC Worms </li></ul><ul><li>File-shaning Network Worms </li></ul><ul><li>Internet Worms </li></ul>
  8. 8. Conclusion <ul><li>As stated above, computer viruses are a major threat to business information system because they cause trillions of dollars loss and the number keeping rising rapidly. However, as time passes, our knowledge and understanding of the computer virus is bound to increase. People will obtain information and knowledge to be able to predict and to influence the future course of computer virus trends in business. </li></ul>
  9. 9. Refrence <ul><li>www. wikipiedia .com </li></ul><ul><li>www.yahoo.com </li></ul><ul><li>www. gogle .com </li></ul>
  10. 10. <ul><li>leukemia virus </li></ul><ul><li>Abelson murine leukemia virus </li></ul><ul><li>Abelson's virus </li></ul><ul><li>acute laryngotracheobronchitis virus </li></ul><ul><li>adeno associated virus group </li></ul><ul><li>Adenovirus </li></ul><ul><li>African horse sickness virus </li></ul><ul><li>African swine fever virus </li></ul>List of ViRusEs
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×