Presentation Virus (salami attack and trojan horse)
Upcoming SlideShare
Loading in...5

Presentation Virus (salami attack and trojan horse)






Total Views
Views on SlideShare
Embed Views



1 Embed 5 5



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • ggd
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Presentation Virus (salami attack and trojan horse) Presentation Virus (salami attack and trojan horse) Presentation Transcript

  •  In computer technology,viruses are malicous software program,a form of malware.By defination,viruses exist on local disk and spread from one computer to another through sharing of “infected” files
  •  Using a flopppy diskette from a machine that has a virus. Downloading a file from the internet(or buletin board) that contains a virus. Getting an email attachment that contains a virus Installing software purchased from a store or mail warehouse.While this is the rarest of the ways,software vendors have been found to ship their software with viruses (unknown to them of course) on the insatallations diskettes or cd-roms
  •  Data diddling Salami attack Internet time theft Logic bomb Virus / Worm attack Trojan horse Cyber pornography
  •  Trojan horse is a program that does something undocumented which the programmer intended,but that the user would not approve of if he knew about it. According to some people,a virus is a particular case of Torjan Horse,namely one that is able to spread to other programs. A simple example of a Trojan Horse would be a program named “Waterfalls.Scr”claiming to be a free waterfall screensaver which,when run instead would allow access to the user’s
  • # Trojan Horse playloads are almost always designed todo various harmful things,but could be harmless.They arebroken down in classification based on how they breachsystem and the damage they cause:# The eight main types of Trojan Horse payloads are:1.Remote access2.Data destructive email sending3.Downloader4.Proxy Trojan(disgusting others as the infectedcomputer)5.FTP Trojan(adding or copying data from the infectedcomputer)6.Security software disable.
  • 1. Denial-of-service attack (DoS)2. URL Trojan (directing the infectedcomputer to only connect to theinternet via an expensive dial-upconnection).
  • SALAMI ATTACK♥This attack is used for the comission of financialcrimes.♥The key here is to make the aliteration soinsignificant that in a single case it would gocompletely unnoticed. E.g:A bank employees inserts a program intothe bank’s serves that deducts a small amount ofmoney from the account of every customer.Why salami attack persist?♥Computer computations are notoriously subjectto small errors involving rounding andtruncation,especially when large number are tobe combined with small ones.
  • CONCLUSION Computer virus can effect the computer system.It can copy itself and infect without permissions or knowledge of the user.