IMPACT OF ICT ON SOCIETY: VIRUS(TROJAN HORSE, SALAMI ATTACK).Presented by: Chai Cheng Fu
Content1. Content2. Definition of Virus3. Viruses are spread many by these four ways4. Example of Virus5. Trojan Horse6. Type of Trojan Horse Payloads7. Denial-of-service attack (DOS)8. Why Salami Attack Persist?9. Conclusion10.Reference
Definition of virusIn computer technology, virusesare malicious software programs,a form of malware. By definition,viruses exist on local disk andspread from one computer toanother through sharing of“infected” files.
Viruses are spread many by these four ways:Using a floppy diskette from a machine that has avirus.Downloading a file from the Internet (or bulletinboard) that contains a virus.Getting an email attachment that contains a virus.Installing software purchased from a store or mailwarehouse. While this is the rarest of the ways,software vendors have been found to ship theirsoftware with viruses (unknown to them of course)on the installations diskettes or cd-roms.
Trojan horse Trojan horse is a program that does somethingundocumented which the programmer intended, but that the user would not approve of if he knew about it. According to some people, a virus is a particular case of Trojan Horse, namely one that is able to spread to other programs. A simple example of a Trojan Horse would be a program named “waterfalls.scr” claiming to be a free waterfall screensaver which, when run instead would allow access to the user’s computer.
Trojan Horse payloads are almost always designed to do various harmful things, but could be harmless.They are broken down in classification based on how they breach system and the damage they cause: The eight main types of Trojan Horse payloads are: Remote access. Data destructive email sending. Downloader. Proxy Trojan (disguising others as the infected computer).FTP Trojan (adding or copying data from the infected computer). Security software disabler.
Denial-of-service attack (DoS)URL Trojan (directing the infected computer to only connect to the Internet via an expensive dial-up connection).This attack is used for the commission offinancial crimes.The key here is to make the alteration soinsignificant that in a single case it would gocompletely unnoticed.E.g: A bank employees inserts a programinto the bank’s serves that deducts a smallamount of money from the account of everycustomer.
WHY SALAMI ATTACK PERSIST?•Computer computations arenotoriously subject to smallerrors involving rounding andtruncation, especially whenlarge number are to becombined with small ones.
CONCLUSIONSComputer virus can affectthe computer system. Itcan copy itself and infecta computer withoutpermissions or knowledgeof the user.