SlideShare a Scribd company logo
1 of 9
VIRUS
~ Presenters ~
Vincent Chong
Kwan Tak Wai
Chu Kean Chern
What is Virus
• A computer virus is a program
that can copy itself and infect the
computer without the permission
of the owner .
How viruses spread
Viruses can be spread by :
~ Downloading a file which contains
virus from the internet.
~ Receiving an email attachment that
includes virus.
~ Opening a given website link from
someone which is a virus website.
How virus avoids being detected
Viruses can prevents being detected in many ways ,
the following is the main prevention method :
~ Encryption . Viruses use encryption to hide their
identity . For example , you type the words “ABC” ,
then you encrypt the words you just typed , and
then the words “ABC” will become fake words like
“DEF”. (Also known as encrypted words)
Examples of Virus
• Trojan Horse
• Salami Attack
These are 2 examples :
What is Trojan Horse
• A trojan horse is a program that will do
harm to the computer quietly.
Example :
You download a free online game and install it.
When you are installing the game , the trojan
also will be installed without your awareness.
You play the game everyday , in the same time ,
the trojan will silently record the keys you have
pressed while typing your password and send it
to the creator of the trojan.
What is Salami Attack
• Salami attack is a program that steals commission
from someone without being noticed.
Example :
A bank worker insert a pen drive into a computer
that controls all the account of every customer ,
then the pen drive starts to transfer a small
amount of money from every customer’s account
to the bank worker’s own account without the
customer’s awareness.
Conclusion
• Have at least one antivirus on your
computer.
• Always keep your antivirus
updated.
• Scan your computer through
antivirus at least once a week.
References
• http://computer.howstuffworks.com/virus.htm
• http://www.scribd.com/doc/13503439/VirusTro
jan-HorseSalami-Attack

More Related Content

What's hot

The Enemy On The Web
The Enemy On The WebThe Enemy On The Web
The Enemy On The Web
Bishan Singh
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 

What's hot (20)

Computer Malware Into
Computer Malware IntoComputer Malware Into
Computer Malware Into
 
The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
ATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - againATEA IT EXPO: Hit by ransomware - again
ATEA IT EXPO: Hit by ransomware - again
 
The Enemy On The Web
The Enemy On The WebThe Enemy On The Web
The Enemy On The Web
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
 
Unit6
Unit6Unit6
Unit6
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
1B03陳卓盈同學簡報
1B03陳卓盈同學簡報1B03陳卓盈同學簡報
1B03陳卓盈同學簡報
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
 
Spyware
SpywareSpyware
Spyware
 
When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Malware
MalwareMalware
Malware
 
Malware and its types
Malware and its typesMalware and its types
Malware and its types
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
Icspa virus removal
Icspa virus removalIcspa virus removal
Icspa virus removal
 

Similar to 186553218456

Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
wardjo
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
ainmz
 

Similar to 186553218456 (20)

Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
ransomware presentation in detail explaination
ransomware presentation in detail explainationransomware presentation in detail explaination
ransomware presentation in detail explaination
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

186553218456

  • 1. VIRUS ~ Presenters ~ Vincent Chong Kwan Tak Wai Chu Kean Chern
  • 2. What is Virus • A computer virus is a program that can copy itself and infect the computer without the permission of the owner .
  • 3. How viruses spread Viruses can be spread by : ~ Downloading a file which contains virus from the internet. ~ Receiving an email attachment that includes virus. ~ Opening a given website link from someone which is a virus website.
  • 4. How virus avoids being detected Viruses can prevents being detected in many ways , the following is the main prevention method : ~ Encryption . Viruses use encryption to hide their identity . For example , you type the words “ABC” , then you encrypt the words you just typed , and then the words “ABC” will become fake words like “DEF”. (Also known as encrypted words)
  • 5. Examples of Virus • Trojan Horse • Salami Attack These are 2 examples :
  • 6. What is Trojan Horse • A trojan horse is a program that will do harm to the computer quietly. Example : You download a free online game and install it. When you are installing the game , the trojan also will be installed without your awareness. You play the game everyday , in the same time , the trojan will silently record the keys you have pressed while typing your password and send it to the creator of the trojan.
  • 7. What is Salami Attack • Salami attack is a program that steals commission from someone without being noticed. Example : A bank worker insert a pen drive into a computer that controls all the account of every customer , then the pen drive starts to transfer a small amount of money from every customer’s account to the bank worker’s own account without the customer’s awareness.
  • 8. Conclusion • Have at least one antivirus on your computer. • Always keep your antivirus updated. • Scan your computer through antivirus at least once a week.