Académique Documents
Professionnel Documents
Culture Documents
Kelas :4PD
Nama Guru :Pn. Marziean
Title P
Contents age
2
What is Virus 3
How Viruses Spread 4
Viruses Escape Detection 5
Infection Occurs 6
Trojan Horse 7
Salami Attack 8
Conclusion 9
Source of Reference 10
A program or piece of code that is load onto
your computer without your knowledge and
runs against your wishes.
A simple virus that can make a copy of itself
over and over again is relatively easy to
produce.
A simple virus is dangerous because it will
quickly use all available memory and bring
the system to a halt.
An even more dangerous type of virus is one
capable of transmitting itself across networks
and by passing security systems
Infections spread from machine to machine,
and from organisation to organisation, in a
number of ways.
Viruses can be transmitted by booting a PC
from an infected medium, executing an
infected program, opening an infected file.
Common routes for virus infiltration include:
* Floppy disks or other media that users can
exchange.
* Email attachments.
* Pirated software.
* Shareware.
The successful spread of a virus depends on
how long it can replicate unnoticed, before its
presence is made known by the activation of
side-effects.
Viruses use two main methods of disguise:
* Encrypting (scrambling) their code to avoid
recognition.
* Preventing applications from seeing the virus in
memory, by interrupt interception
In order to infect a computer, a virus has to
have the chance to execute its code.
Viruses usually ensure that this happens by
behaving like a parasite, i.e. by modifying
another item so that the virus code is
executed when the legitimate item is run or
opened.
As long as the virus is active on the computer,
it can copy itself to other files or disks that are
accessed.
A destructive program that masquerades as a
begin application.
Trojan horses do not replicate themselves but
they can be just as destructive.
Trojan horse is a program that claims to rid
your computer of viruses but instead
introduces viruses onto your computer.
This attack is used for the commission of financial
crimes.
The key here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed.
Example , a bank employee inserts a program into
the bank's servers, that deducts a small amount
of money (say Rs.5 a month) from the account of
every customer.
No single account holder will probably notice this
unauthorized debit, but the bank employee will
make a sizable amount of money every month.
Install antivirus on computer.
Update your antivirus weekly to make your
computer well protected.
Scan the drives manually atleast once a
week.
Scan every file on removeable drive before
copying them into your computer.
www.thocp.net/reference/virus/what_is_a_virus.htm
www.scribd.com/doc/7188181/virus?autodown=pp
Thank You