10
VIRUS ( TROJAN HORSE AND SALAMI ATTACK) NAME IN GROUP: MAGDALEN BENJAMIN MUHD KHAIRIL MARUSIN RIDZWAN CHOCK CHUEN KEIN NUR NAJWA SYUHADAH ROSDI WAN NUR FATIN NAJWA WAN AZIZAN

Virus (TROJAN HORSE AND SALAMI ATTACK)

Embed Size (px)

DESCRIPTION

promote resource for reference. This is a task that has been inspected by the inspector d my school. I hope it can be useful to all of you.

Citation preview

VIRUS ( TROJAN HORSE AND SALAMI ATTACK)

VIRUS( TROJAN HORSE AND SALAMI ATTACK)NAME IN GROUP:MAGDALEN BENJAMINMUHD KHAIRIL MARUSINRIDZWAN CHOCK CHUEN KEINNUR NAJWA SYUHADAH ROSDIWAN NUR FATIN NAJWA WAN AZIZAN

DEFINITION OF VIRUS A program designed to attach itself to a file, reproduce and spread from one file to another, destroying data, displaying an irriting massage or otherwise disruping computer operations.TROJAN HORSETROJAN HORSE is a program that does something undocumented which the programmer instended, but that the user would not approve of if he or she is new about it.According to some people, a virus is a particular case of Trojan Horse, namely onethat is able to spread to other programs.A simple of a Trojan Horse would be a program named waterfalls.scrclaiming to be a free waterfalls screensaver which, when run instead would allow access to the users computers.TYPE OF TROJAN HORSE PAYLOADSThe main types of trojan horse payloads are:Remote accessData destructive email sendingDownloader Proxy Trojan ( Disguising other as the infected computers)FTP (Adding or copying data from the infected computers)Secuirity software disabler.EFFECT OF VIRUS (TROJAN HORSE)There are no real barnies to what any mind of malware can do to your machine. If the programmer wants, it can sit and watch for creadit card numbers or force you to reinstall windows and love everything on the disk.SALAMI ATTACKA Salami Attack is a series of minor data security attacks that together result in a large attack. For example, a frand activity in a bank where an empoyer steals a small amount of funds from several accounts, can be considered a salami attack. Crimes involving salami attacks typically are difficult to detect and trace.THE SALAMI ANALOGYOne perspective depicts taking such thin slices off end of a salami that there is no noticeable difference in its oversall size.The perpetrator, who did the slicing, then sneaks away with the stolen pieces. From another angle,the perpetrator deceptively acquires a whole salami.EFFECT OF SALAMI ATTACKA salami attack is a series of minor attacks that together result in a large attack. You need 3 programs to defend your computer Anti virus to keep the viruses out (use ONLY ONE)Firewall to keep the bad guys out (use ONLY ONE)Anti spyware to keep the malware, popup, password stealers outCONCLUSIONWe must ensure that our software is constantly updated. In addition, we also need to choose a reliable anti virus.SOURCES OF REFERENCEShttp://en.wikipedia.org/wiki/computer_virushttp://en.wikipedia.org/wiki/Trojan_horsehttps://answers.yahoo.com/question/index?qid=20100708141443AAk8http://en.wikipedia.org/wiki/Salami_slicing