SO2 Virus(Trojan Horse & SALami Attack)
-
Upload
john-ganeshan -
Category
Documents
-
view
165 -
download
6
Transcript of SO2 Virus(Trojan Horse & SALami Attack)
1
VIRUSTROJAN HORSE&
SALAMI ATTACK
2
What is VirusA computer virus is a computer
program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
3
Trojan HorseA Trojan horse, or Trojan, is a
standalone malicious program that does not attempt to infect other computers in a completely automatic manner without help from outside forces like other programs and human intervention.
Trojan horses can make copies of them, steal information, or harm their host computer systems. The term is derived from the Trojan Horse story in Greek mythology because the first and many current Trojan horses attempt to appear as helpful programs.
Others rely on drive-by downloads in order to reach target computers.
4
Effect Of Virus( Trojan Horse )
When you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disks, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks.
5
Salami AttackSalami attack is a series
of minor data-security attacks that together result in a larger attack. For example a fraud activity in a bank where an employed steals a small amount of funds from several accounts, can be considered a salami attack.
Crimes involving salami attacks typically are difficult to detect and trace.
6
Effect of virus(Salami Attack)
The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money from the account of every customer
Why Salami Attacks Persist Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large numbers are to be combined with small ones.
7
How To Prevent VirusAs soon as you suspect that your computer has a virus, remove your computer from any networks it might be on as well from the internet.
If you have virus-scanning ( anti virus ) software installed, run it. If you don’t have anti-virus, you’ll need to obtain some. You can get the anti-virus from a network administrator or download it from an uninfected computer.
Start your computer and follow the instructions that came with anti-virus software. Keep running the virus scanning software until your computer comes up clean.
8
CONCLUSION• The computer virus is a very dangerous when
its going to critical situation. So, we should prevent our computers from virus.
9
Reference • http://www.iriscan.com/basic.htm• http://biometrics.cse.msu.edu/fingerprint.htnl
10
Done By,Virshalini d/o Manimaran
Group Member,Athirah Binti Rosli
11
THE END