Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

  • Be the first to comment

  • Be the first to like this


  1. 3. ESPRIT DE CORPS GROUP The Introduction on Various Kind of Viruses and Spyware
  2. 4. Viruses <ul><li>It is an infectious program which affects computer systems and data. </li></ul><ul><li>Viruses are spread to any other programs they contact, thus being infectious. </li></ul><ul><li>A virus will attach a copy of itself to an executable program. </li></ul><ul><li>They usually consist of a reproduction mechanism, a trigger mechanism, and an action. </li></ul><ul><li>There are two types of viruses: </li></ul><ul><li>i) Benign viruses are used for maintenance and for compression. </li></ul><ul><li>ii) Malicious viruses which disturbs our computer system. </li></ul>ESPRIT DE CORPS GROUP
  3. 5. <ul><li>A program with hidden functionality. </li></ul><ul><li>An example of it is a program which captures </li></ul><ul><li>passwords secretly. </li></ul><ul><li>Trojan horses can occur by being buried in object </li></ul><ul><li>code or by modifying existing source code. </li></ul><ul><li>Trojan horses may be encrypted or scattered </li></ul><ul><li>throughout a program, making it difficult to detect. </li></ul>Trojan Horses ESPRIT DE CORPS GROUP
  4. 6. Salami Attacks <ul><li>A programmed attack which is implemented in small (meant to be unnoticeable) increments. So, it is easily concealed. </li></ul><ul><li>Rounding down interest calculations and placing the difference in your account is an example of a salami attack. </li></ul>ESPRIT DE CORPS GROUP
  5. 7. Worms <ul><li>A program which replicates itself over a network. </li></ul><ul><li>Unlike a virus a worm does not need to attach itself to another program in order to replicate. </li></ul><ul><li>The Internet Worm released by Robert Morris is an example of the danger and the magnitude of denial of service caused by a worm. </li></ul>ESPRIT DE CORPS GROUP
  6. 8. Trap Doors <ul><li>Trap Doors are secret entry points to a program put in during development by the programmer. </li></ul><ul><li>They may be used for testing or maintenance, but can also be used to gain unauthorized access at a later time. </li></ul><ul><li>Danger exists if the trap door is exploited by the original programmer or if it is discovered by others. </li></ul>ESPRIT DE CORPS GROUP
  7. 9. Greedy Programs <ul><li>By using a significant portion of the CPU and other system resources, greedy programs result in a denial of service. Greedy programs can be accidental or malicious. </li></ul><ul><li>An example of a malicious greedy program is a mail bomb. </li></ul>ESPRIT DE CORPS GROUP
  9. 11. <ul><li>SPECIAL THANKS TO: </li></ul><ul><li>En. Ahmad Fauzi ( 4 Alf  ICT Teacher) </li></ul><ul><li>Students of 4 Alf  </li></ul><ul><li>20 th CENTURY FOX </li></ul><ul><li>LUCASFILM Ltd </li></ul><ul><li>and to all who had help us in making this presentation successful. </li></ul>A PRODUCT OF COLLEGE ESPRIT DE CORPS GROUP®