Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
Virus (Trojan Horse and Salami Attack)
Name : Azham Bin Abd Razak I/C Number : 950615-10-5423 Class : 4 Darussalam Teacher s Name : Sir Pahuddin Bin Md Saman
Number 1 2 3 4 4 5 6
Contents The Definition Of Computer Virus The Types Of Computer Viruses The Trojan Horse Salami Attack The Differences Between Worm and Trojan Horse Conclusion The Sources Of Reference
Slide number 3 5 6 7 8 9 10
Computer viruses are most easily spread by attachments in e-mail messages or by instant messaging messages. Computer viruses can be disguised as attachments of funny images,greeting cards,or audio and video files. Computer viruses can be hidden in pirated software or in other files or programs that you may download. The computer viruses also can spread when it s host is taken to the target computer : for instance because a user sent it over a network or the Internet,or carried it on a removable medium such as a floppy disk,CD,DVD,VCD,or USB drive.
4
Salami Attack
This attack is used for the commission of financialcrimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. Example , a bank employee inserts a program into the bank's servers, that deducts a small amountof money (say RM 5 a month) from the account ofevery customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month
7
Conclusion
enemy.Computer viruses are especially pernicious.They can and do strike any unprotected computer system , with results that range from merely annoying to the disastrous.Time consuming anf expensive loss of software and data.And with corporations and increasingly using computer for enterprise-wide , business-critical computing , the cost of viruses induced down time are growing along with the threat.
http://en.wikipedia.org/wiki/Computer_virus
Reference book :
PC Malaysia
10