Nama :Amirul Farhan Bin Burhan Kelas :4PD Nama Guru :Pn. Marziean
Title Contents
P age 2
What is Virus
3
How Viruses Spread
4
Viruses Escape Detection
5
Infection Occurs
6
Trojan Horse
7
Salami Attack
8
Conclusion
9
Source of Reference
10
A program or piece of code that is load onto
your computer without your knowledge and runs against your wishes. A simple virus that can make a copy of itself over and over again is relatively easy to produce. A simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and by passing security systems
Infections spread from machine to machine,
and from organisation to organisation, in a number of ways. Viruses can be transmitted by booting a PC from an infected medium, executing an infected program, opening an infected file. Common routes for virus infiltration include: * Floppy disks or other media that users can exchange. * Email attachments. * Pirated software. * Shareware.
The successful spread of a virus depends on
how long it can replicate unnoticed, before its presence is made known by the activation of side-effects. Viruses use two main methods of disguise: * Encrypting (scrambling) their code to avoid recognition. * Preventing applications from seeing the virus in memory, by interrupt interception
In order to infect a computer, a virus has to
have the chance to execute its code. Viruses usually ensure that this happens by behaving like a parasite, i.e. by modifying another item so that the virus code is executed when the legitimate item is run or opened. As long as the virus is active on the computer, it can copy itself to other files or disks that are accessed.
A destructive program that masquerades as a
begin application. Trojan horses do not replicate themselves but they can be just as destructive. Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
This attack is used for the commission of financial
crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. Example , a bank employee inserts a program into the bank's servers, that deducts a small amount of money (say Rs.5 a month) from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
Install antivirus on computer. Update your antivirus weekly to make your
computer well protected. Scan the drives manually atleast once a week. Scan every file on removeable drive before copying them into your computer.
www.thocp.net/reference/virus/what_is_a_virus.htm
www.pdfcoke.com/doc/7188181/virus?autodown=pp
Thank You