Sunteți pe pagina 1din 10

Nama :Amirul Farhan Bin Burhan

Kelas :4PD
Nama Guru :Pn. Marziean
Title P
Contents age
2
What is Virus 3
How Viruses Spread 4
Viruses Escape Detection 5
Infection Occurs 6
Trojan Horse 7
Salami Attack 8
Conclusion 9
Source of Reference 10
A program or piece of code that is load onto
your computer without your knowledge and
runs against your wishes.
A simple virus that can make a copy of itself
over and over again is relatively easy to
produce.
A simple virus is dangerous because it will
quickly use all available memory and bring
the system to a halt.
An even more dangerous type of virus is one
capable of transmitting itself across networks
and by passing security systems
Infections spread from machine to machine,
and from organisation to organisation, in a
number of ways.
Viruses can be transmitted by booting a PC
from an infected medium, executing an
infected program, opening an infected file.
 Common routes for virus infiltration include:
* Floppy disks or other media that users can
exchange.
* Email attachments.
* Pirated software.
* Shareware.
The successful spread of a virus depends on
how long it can replicate unnoticed, before its
presence is made known by the activation of
side-effects.
Viruses use two main methods of disguise:
* Encrypting (scrambling) their code to avoid
recognition.
* Preventing applications from seeing the virus in
memory, by interrupt interception
In order to infect a computer, a virus has to
have the chance to execute its code.
Viruses usually ensure that this happens by
behaving like a parasite, i.e. by modifying
another item so that the virus code is
executed when the legitimate item is run or
opened.
As long as the virus is active on the computer,
it can copy itself to other files or disks that are
accessed.
A destructive program that masquerades as a
begin application.
Trojan horses do not replicate themselves but
they can be just as destructive.
Trojan horse is a program that claims to rid
your computer of viruses but instead
introduces viruses onto your computer.
 This attack is used for the commission of financial
crimes.
 The key here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed.
 Example , a bank employee inserts a program into
the bank's servers, that deducts a small amount
of money (say Rs.5 a month) from the account of
every customer.
 No single account holder will probably notice this
unauthorized debit, but the bank employee will
make a sizable amount of money every month. 
 Install antivirus on computer.
 Update your antivirus weekly to make your
computer well protected.
 Scan the drives manually atleast once a
week.
 Scan every file on removeable drive before
copying them into your computer.
www.thocp.net/reference/virus/what_is_a_virus.htm
www.scribd.com/doc/7188181/virus?autodown=pp

Thank You

S-ar putea să vă placă și