Sie sind auf Seite 1von 7

COMPUTER VIRUS (TROJAN HORSE & SALAMI ATTACK)H B T P R E PA R E D B Y : W A J H A I

M O H D S A D LI

COMPUTER VIRUS
Acomputer virusis acomputer programthat can copy itselfand infect a computer. The term "virus" is also commonly but erroneously used to refer to other types ofmalware, including but not limited toadwareandspywareprograms that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executablecode) when its host is taken to the target computer; for instance because a user sent it over a network or theInternet, or carried it on a removable medium such as afloppy disk,CD,DVD, orUSB drive. Viruses can increase their chances of spreading to other computers by infecting files on anetwork file systemor a file system that is accessed by another computer.

TROJAN HORSE
ATrojan horse, orTrojan, is a destructive program that masquerades as a kindly application. The software initially appears to perform a desirable function for the user prior to installation or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlikevirusesorworms, Trojan horses do not replicate themselves, but they can be just as destructive. The term is derived from the Greek myth of theTrojan War, in which the Greeks gave a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering.

EFFECT OF TROJAN HORSE


W h e n yo u d o w n l a d a m o vi o r m u si fi e o e c l a n d cl cko n i , yo u u n l a sh a d a n g e ro u s i t e p ro g ra m th a te ra se s yo u r d i , se n d s sk yo u r cre d i ca rd n u m b e rs a n d p a ssw o rd s t to a stra n g e r, o r l ts th a tstra n g e r h i a ck e j yo u r co m p u te rto co m m i t i l g a l e n i l f se rvi d e n i l f se rvi le d a o ce a o ce a tta cks

SALAMI ATTACK
This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. For example, a fraud activity in a bank where anemployedsteals a small amount of funds from several accounts, can be considereda salami attack. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. Crimesinvolving salami attacks typically are difficult to detect and trace.

CONCLUSION
I sta l a n ti ru s o n co m p u te r. n l vi U p d a te yo u r a n ti ru s w e e kl to m a ke yo u r vi y co m p u te r w e l ro te cte d . lp S ca n th e d ri s m a n u a l y a t l a st o n ce a w e e k . ve l e S ca n e ve ry fi e o n re m o va b l d ri b e fo re l e ve co p yi g th e m i to yo u r co m p u te r. n n

REFERENCE
http://en.wikipedia.org/wiki/Computer_virus http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.scribd.com/doc/19676777/Computer-VirusTrojan-Horse-SalamiAttack http://virus-informati0n.blogspot.com/2007/06/1.html http://www.scribd.com/doc/13503439/VirusTrojan-HorseSalami-Attack

Das könnte Ihnen auch gefallen