SO2 Virus(Trojan Horse & SALami Attack)

11
VIR US ROJAN HORSE & ALAMI ATTACK 1

Transcript of SO2 Virus(Trojan Horse & SALami Attack)

Page 1: SO2 Virus(Trojan Horse & SALami Attack)

1

VIRUSTROJAN HORSE&

SALAMI ATTACK

Page 2: SO2 Virus(Trojan Horse & SALami Attack)

2

What is VirusA computer virus is a computer

program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.

Page 3: SO2 Virus(Trojan Horse & SALami Attack)

3

Trojan HorseA Trojan horse, or Trojan, is a

standalone malicious program that does not attempt to infect other computers in a completely automatic manner without help from outside forces like other programs and human intervention.

Trojan horses can make copies of them, steal information, or harm their host computer systems. The term is derived from the Trojan Horse story in Greek mythology because the first and many current Trojan horses attempt to appear as helpful programs.

Others rely on drive-by downloads in order to reach target computers.

Page 4: SO2 Virus(Trojan Horse & SALami Attack)

4

Effect Of Virus( Trojan Horse )

When you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disks, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks.

Page 5: SO2 Virus(Trojan Horse & SALami Attack)

5

Salami AttackSalami attack is a series

of minor data-security attacks that together result in a larger attack. For example a fraud activity in a bank where an employed steals a small amount of funds from several accounts, can be considered a salami attack.

Crimes involving salami attacks typically are difficult to detect and trace.

Page 6: SO2 Virus(Trojan Horse & SALami Attack)

6

Effect of virus(Salami Attack)

The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money from the account of every customer

Why Salami Attacks Persist Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large numbers are to be combined with small ones.

Page 7: SO2 Virus(Trojan Horse & SALami Attack)

7

How To Prevent VirusAs soon as you suspect that your computer has a virus, remove your computer from any networks it might be on as well from the internet.

If you have virus-scanning ( anti virus ) software installed, run it. If you don’t have anti-virus, you’ll need to obtain some. You can get the anti-virus from a network administrator or download it from an uninfected computer.

Start your computer and follow the instructions that came with anti-virus software. Keep running the virus scanning software until your computer comes up clean.

Page 8: SO2 Virus(Trojan Horse & SALami Attack)

8

CONCLUSION• The computer virus is a very dangerous when

its going to critical situation. So, we should prevent our computers from virus.

Page 9: SO2 Virus(Trojan Horse & SALami Attack)

9

Reference • http://www.iriscan.com/basic.htm• http://biometrics.cse.msu.edu/fingerprint.htnl

Page 10: SO2 Virus(Trojan Horse & SALami Attack)

10

Done By,Virshalini d/o Manimaran

Group Member,Athirah Binti Rosli

Page 11: SO2 Virus(Trojan Horse & SALami Attack)

11

THE END