TROJAN HORSE              SALAMI ATTACK


 PRESENTED BY : ABDUL KARIM BIN ZAKARIA
A computer virus infection may cause the
          following problems :-

         A disk utility such as Scandisk reports multiple
                        serious disk errors.

      The computer sometimes starts as expected. However, at
       other times, the computer stops responding before the
               desktop icons and the taskbar appear.


       The computer runs very slowly. Additionally, the
        computer takes longer than expected to start.


                      New programs are installed
                             incorrectly.
TYPE OF VIRUS - Not all computer viruses
behave, replicate, or infect the same way. There are
several different categories of viruses and malware.
Example of viruses are :
Trojan horse is         a standalone malicious program
designed to give full control of infected PC to another
PC. It can also perform other typical computer virus
activities. Trojan horses can make copies of themselves,
steal information, or harm their host computer systems.


A Trojan        gives a hacker remote access to a
targeted computer system. Once a Trojan has been
installed on a targeted computer system, the hacker
has remote access to the computer and can perform all
kinds of operations.
Operations that could be performed by
a hacker on a targeted computer
system include:
1. electronic money theft
2. Data theft
3. Installation of software, including third-
party malware
4. Modification or deletion of files
5. Keystroke logging
6. Watching the user's screen
7. Anonymizing internet viewing
8. Downloading or uploading of files on the
user's computer
A salami attack is a series of minor computer
crimes that together results in a larger crime.
Typically, this type of crime is hard to detect and
trace.


The most typical scheme portrayed by a
salami attack is that which involves an
automated modification to financial systems
and their data.
Example of Salami Attack


A fraud activity in a bank where an employee
 steals a small amount of funds from several
accounts, can be considered a salami attack
                     .
Computer virus can affect the
computer system. It can copy itself
and infect a computer without
permissions or knowledge of the user.
So we need anti-virus to protect our
computer and beware when download
something.
1. www.wikipedia.org
2. www.scibd.com
3. www.slideshare.net
4. www.websters-online-dictionary.org
5. www.wiki.answers.com
6. www.webopedia.com
7. www.antivirus-software.topchoicereviews.com

Virus (Trojan Horse and Salami Attack)

  • 1.
    TROJAN HORSE SALAMI ATTACK PRESENTED BY : ABDUL KARIM BIN ZAKARIA
  • 3.
    A computer virusinfection may cause the following problems :- A disk utility such as Scandisk reports multiple serious disk errors. The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear. The computer runs very slowly. Additionally, the computer takes longer than expected to start. New programs are installed incorrectly.
  • 4.
    TYPE OF VIRUS- Not all computer viruses behave, replicate, or infect the same way. There are several different categories of viruses and malware. Example of viruses are :
  • 5.
    Trojan horse is a standalone malicious program designed to give full control of infected PC to another PC. It can also perform other typical computer virus activities. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. A Trojan gives a hacker remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, the hacker has remote access to the computer and can perform all kinds of operations.
  • 6.
    Operations that couldbe performed by a hacker on a targeted computer system include: 1. electronic money theft 2. Data theft 3. Installation of software, including third- party malware 4. Modification or deletion of files 5. Keystroke logging 6. Watching the user's screen 7. Anonymizing internet viewing 8. Downloading or uploading of files on the user's computer
  • 7.
    A salami attackis a series of minor computer crimes that together results in a larger crime. Typically, this type of crime is hard to detect and trace. The most typical scheme portrayed by a salami attack is that which involves an automated modification to financial systems and their data.
  • 8.
    Example of SalamiAttack A fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack .
  • 9.
    Computer virus canaffect the computer system. It can copy itself and infect a computer without permissions or knowledge of the user. So we need anti-virus to protect our computer and beware when download something.
  • 10.
    1. www.wikipedia.org 2. www.scibd.com 3.www.slideshare.net 4. www.websters-online-dictionary.org 5. www.wiki.answers.com 6. www.webopedia.com 7. www.antivirus-software.topchoicereviews.com