IMPACT OF ICT ON SOCIETY: VIRUS (TROJAN HORSE, SALAMI ATTACK). Presented by: Ferellica Anne
Definition of virus. In computer technology, viruses are malicious software programs, a form of malware. By definition, viruses exist on local disk and spread from one computer to another through sharing of “infected” files. VIRUS
Viruses are spread manly by these four ways: Using a floppy diskette from a machine that has a virus. Downloading a file from the Internet (or bulletin board) that contains a virus. Getting an email attachment that contains a virus. Installing software purchased from a store or mail warehouse. While this is the rarest of the ways, software vendors have been found to ship their software with viruses (unknown to them of course) on the installations diskettes or cd-roms. VIRUS
Example of virus: Data diddling. Salami attack. Internet time theft. Logic bomb. Virus/Worm attack. Trojan Horse attack. Cyber pornography. VIRUS
Trojan horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it. According to some people, a virus is a particular case of Trojan Horse, namely one that is able to spread to other programs. A simple example of a Trojan Horse would be a program named “waterfalls.scr” claiming to be a free waterfall screensaver which, when run instead would allow access to the user’s computer. TROJAN HORSE
TYPES OF TROJAN HORSE PAYLOADS. Trojan Horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach system and the damage they cause: The eight main types of Trojan Horse payloads are: Remote access. Data destructive email sending. Downloader. Proxy Trojan (disguising others as the infected computer). FTP Trojan (adding or copying data from the infected computer). Security software disabler. TROJAN HORSE
Denial-of-service attack (DoS). URL Trojan (directing the infected computer to only connect to the Internet via an expensive dial-up connection). TROJAN HORSE
This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g: A bank employees inserts a program into the bank’s serves that deducts a small amount of money from the account of every customer. WHY SALAMI ATTACK PERSIST? Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large number are to be combined with small ones. SALAMI ATTACK
Computer virus can affect the computer system. It can copy itself and infect a computer without permissions or knowledge of the user. CONCLUSIONS
http://www.iriscan.com/basic.htm http://www.biometrics.cse.meu.edu/fingerprints.html http://www.i.are.talk.com/htm http://www.slideshare.com/htm http://www.slideshare.nets/htm http://www.heart_of_angel.com/virus(trojanhorse)(salamiattack).htm REFERENCES

Virus (Trojan Horse,Salami Attack)

  • 1.
    IMPACT OF ICTON SOCIETY: VIRUS (TROJAN HORSE, SALAMI ATTACK). Presented by: Ferellica Anne
  • 2.
    Definition of virus.In computer technology, viruses are malicious software programs, a form of malware. By definition, viruses exist on local disk and spread from one computer to another through sharing of “infected” files. VIRUS
  • 3.
    Viruses are spreadmanly by these four ways: Using a floppy diskette from a machine that has a virus. Downloading a file from the Internet (or bulletin board) that contains a virus. Getting an email attachment that contains a virus. Installing software purchased from a store or mail warehouse. While this is the rarest of the ways, software vendors have been found to ship their software with viruses (unknown to them of course) on the installations diskettes or cd-roms. VIRUS
  • 4.
    Example of virus:Data diddling. Salami attack. Internet time theft. Logic bomb. Virus/Worm attack. Trojan Horse attack. Cyber pornography. VIRUS
  • 5.
    Trojan horse isa program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it. According to some people, a virus is a particular case of Trojan Horse, namely one that is able to spread to other programs. A simple example of a Trojan Horse would be a program named “waterfalls.scr” claiming to be a free waterfall screensaver which, when run instead would allow access to the user’s computer. TROJAN HORSE
  • 6.
    TYPES OF TROJANHORSE PAYLOADS. Trojan Horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach system and the damage they cause: The eight main types of Trojan Horse payloads are: Remote access. Data destructive email sending. Downloader. Proxy Trojan (disguising others as the infected computer). FTP Trojan (adding or copying data from the infected computer). Security software disabler. TROJAN HORSE
  • 7.
    Denial-of-service attack (DoS).URL Trojan (directing the infected computer to only connect to the Internet via an expensive dial-up connection). TROJAN HORSE
  • 8.
    This attack isused for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g: A bank employees inserts a program into the bank’s serves that deducts a small amount of money from the account of every customer. WHY SALAMI ATTACK PERSIST? Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large number are to be combined with small ones. SALAMI ATTACK
  • 9.
    Computer virus canaffect the computer system. It can copy itself and infect a computer without permissions or knowledge of the user. CONCLUSIONS
  • 10.
    http://www.iriscan.com/basic.htm http://www.biometrics.cse.meu.edu/fingerprints.html http://www.i.are.talk.com/htmhttp://www.slideshare.com/htm http://www.slideshare.nets/htm http://www.heart_of_angel.com/virus(trojanhorse)(salamiattack).htm REFERENCES