Vous êtes sur la page 1sur 10

Name:Nur Azifah binti Buang

Class:4 Jauhari 1
contents
Contents………………………….2
The meaning of virus……………3
Trojan horse…………………….4-7
Salami attack…………………..8
Conclusion……………………..9
Reference………………………10
The meanig of virus
• A program or piece of codedde that is load onto your computer
without your knowledge and runs against your wishes
• .
• A simple virus that can make a copy of itself over and over
again is relatively easy to produce.

• a simple virus is dangerous because it will quickly use all


available memory and bring the system to a halt.

• An even more dangerous type of virus is one capable of


transmitting itself across networks and bypassing security
systems
Trojan horse
• A destructive program that masquerades
as a benign application.
• Trojan horses do not replicate themselves
but they can be just as destructive.
• Trojan horse is a program that claims to
rid your computer of viruses but instead
introduces viruses onto your computer.
• . The seven main types of Trojan
horses are:
• 1)Remote Access Trojans
• Abbreviated as RATs, a Remote Access Trojan is one of seven
major types of Trojan horse designed to provide the attacker
with complete control of the victim's system. Attackers usually
hide these Trojan horses in games and other small programs
that unsuspecting users then execute on their PCs.

• 2) Destructive Trojans:
• A type of Trojan horse designed to destroy and delete files,
and is more like a virus than any other Trojan. It can often go
undetected by antivirus
• 3)Data Sending Trojans :
• A type of a Trojan horse that is designed to provide the attacker
with sensitive data such as passwords, credit card information, log
files, e-mail address or IM contact lists. These Trojans can look for
specific pre-defined data (e.g., just credit card information or
passwords), or they could install a keylogger and send all recorded
keystrokes back to the attacker.
• 4) Proxy Trojans
• proxy server. This gives the attacker the opportunity to do
everything from your computer, including the possibility of
conducting credit card fraud and other illegal activities, or
even to use your system to launch malicious attacks
against other networks.
• 5) FTP Trojans :
• A type of Trojan horse designed to open port 21 (the
port for FTP transfer) and lets the attacker connect to your
computer using File Transfer Protocol (FTP).
• 6)security software disabler Trojans:
• A type of Trojan horse designed stop or kill security programs such as
an antivirus program or firewall without the user knowing. This Trojan
type is normally combined with another type of Trojan as a payload.

• 7) denial-of-service attack (DoS) Trojans:


• a type of attack on a network that is designed to bring the network
to its knees by flooding it with useless traffic. Many DoS attacks, such
as the Ping of Death and Teardrop attacks, exploit limitations in the
TCP/IP protocols. For all known DoS attacks, there are software fixes
that system administrators can install to limit the damage caused by
the attacks. But, like viruses, new DoS attacks are constantly being
dreamed up by hackers.
Salami attack
• This attack is used for the commission of
financial crimes. The key here is to make the
alteration so insignificant that in a single
case it would go completely unnoticed, e.g. a
bank employee inserts a program into the
bank's servers, that deducts a small amount
of money (say Rs.5 a month) from the
account of every customer. No single
account holder will probably notice this
unauthorized debit, but the bank employee
will make a sizable amount of money every
month.
Conclusion
• Install antivirus on computer.
• Update your antivirus weekly to make ypur
computer well protected
• Scan the drives manually atleast once a week
• Scan every file on removeable drive before
copying them into your computer.
Reference
• http://www.webopedia.com/TERM/D/DoS_
attack.htmlhttp://www.webopedia.com/TE
RM/D/DoS_attack.htmlhttp://www.webope
dia.com/TERM/D/DoS_attack.htmlhttp://w
ww.webopedia.com/TERM/D/DoS_attack.
htmlhttp://www.webopedia.com/TERM/D/
DoS_attack.htmlhttp://www.webopedia.co
m/TERM/D/DoS_attack.htmlhttp://www.we
bopedia.com/TERM/D/DoS_attack.html