Virus(trojan Horse,salami Attack)

  • Uploaded by: amirul_farhan
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Virus(trojan Horse,salami Attack) as PDF for free.

More details

  • Words: 475
  • Pages: 10
Nama :Amirul Farhan Bin Burhan Kelas :4PD Nama Guru :Pn. Marziean

Title Contents

P age 2

What is Virus

3

How Viruses Spread

4

Viruses Escape Detection

5

Infection Occurs

6

Trojan Horse

7

Salami Attack

8

Conclusion

9

Source of Reference

10

A program or piece of code that is load onto

your computer without your knowledge and runs against your wishes. A simple virus that can make a copy of itself over and over again is relatively easy to produce. A simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and by passing security systems

Infections spread from machine to machine,

and from organisation to organisation, in a number of ways. Viruses can be transmitted by booting a PC from an infected medium, executing an infected program, opening an infected file.  Common routes for virus infiltration include: * Floppy disks or other media that users can exchange. * Email attachments. * Pirated software. * Shareware.

The successful spread of a virus depends on

how long it can replicate unnoticed, before its presence is made known by the activation of side-effects. Viruses use two main methods of disguise: * Encrypting (scrambling) their code to avoid recognition. * Preventing applications from seeing the virus in memory, by interrupt interception

In order to infect a computer, a virus has to

have the chance to execute its code. Viruses usually ensure that this happens by behaving like a parasite, i.e. by modifying another item so that the virus code is executed when the legitimate item is run or opened. As long as the virus is active on the computer, it can copy itself to other files or disks that are accessed.

A destructive program that masquerades as a

begin application. Trojan horses do not replicate themselves but they can be just as destructive. Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

 This attack is used for the commission of financial

crimes.  The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.  Example , a bank employee inserts a program into the bank's servers, that deducts a small amount of money (say Rs.5 a month) from the account of every customer.  No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. 

 Install antivirus on computer.  Update your antivirus weekly to make your

computer well protected.  Scan the drives manually atleast once a week.  Scan every file on removeable drive before copying them into your computer.

www.thocp.net/reference/virus/what_is_a_virus.htm

www.pdfcoke.com/doc/7188181/virus?autodown=pp

Thank You

Related Documents

Attack
November 2019 53
Heart Attack
June 2020 15
Cryptographic Attack
April 2020 21
Attack List
April 2020 23
Mumbai Attack
June 2020 18
0171 - Attack
May 2020 14