Virus (Trojan Horse and Salami Attack)

17,137 views
16,141 views

Published on

Coursework ICT FORM 4

Published in: Education, Technology
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
17,137
On SlideShare
0
From Embeds
0
Number of Embeds
29
Actions
Shares
0
Downloads
301
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

Virus (Trojan Horse and Salami Attack)

  1. 1. TROJAN HORSE SALAMI ATTACK PRESENTED BY : ABDUL KARIM BIN ZAKARIA
  2. 2. A computer virus infection may cause the following problems :- A disk utility such as Scandisk reports multiple serious disk errors. The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear. The computer runs very slowly. Additionally, the computer takes longer than expected to start. New programs are installed incorrectly.
  3. 3. TYPE OF VIRUS - Not all computer virusesbehave, replicate, or infect the same way. There areseveral different categories of viruses and malware.Example of viruses are :
  4. 4. Trojan horse is a standalone malicious programdesigned to give full control of infected PC to anotherPC. It can also perform other typical computer virusactivities. Trojan horses can make copies of themselves,steal information, or harm their host computer systems.A Trojan gives a hacker remote access to atargeted computer system. Once a Trojan has beeninstalled on a targeted computer system, the hackerhas remote access to the computer and can perform allkinds of operations.
  5. 5. Operations that could be performed bya hacker on a targeted computersystem include:1. electronic money theft2. Data theft3. Installation of software, including third-party malware4. Modification or deletion of files5. Keystroke logging6. Watching the users screen7. Anonymizing internet viewing8. Downloading or uploading of files on theusers computer
  6. 6. A salami attack is a series of minor computercrimes that together results in a larger crime.Typically, this type of crime is hard to detect andtrace.The most typical scheme portrayed by asalami attack is that which involves anautomated modification to financial systemsand their data.
  7. 7. Example of Salami AttackA fraud activity in a bank where an employee steals a small amount of funds from severalaccounts, can be considered a salami attack .
  8. 8. Computer virus can affect thecomputer system. It can copy itselfand infect a computer withoutpermissions or knowledge of the user.So we need anti-virus to protect ourcomputer and beware when downloadsomething.
  9. 9. 1. www.wikipedia.org2. www.scibd.com3. www.slideshare.net4. www.websters-online-dictionary.org5. www.wiki.answers.com6. www.webopedia.com7. www.antivirus-software.topchoicereviews.com

×