Sunteți pe pagina 1din 13

Name of Candidate: Bernadette Evie Majikol Cordelia Scholastica Marysia Lawrence Patricia Roland Class: 4 Cekap School: SMK

Datuk Peter Mojuntin


1

Computer Virus Definition Of Trojan Horse About Trojan Horse Types Of Trojan Horse What does a Trojan Horse virus do?

About of Salami Attack Effect of Salami Attack How to prevent virus Conclusion

Reference
2

A computer virus is a computer program that can replicate itself and spread from one computer to another. The term virus is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
3

Trojan Horse is a program in which harmful code is contained insides apparently harmless programming or data in such a way that it can get control and do its chosen form of damage.

It is a virus, which gets attached to some files in your computer and programs that you download from internet. The main characteristic of this is that once it gets a way into your computer it starts destroying the files secretly.
5

Remote Access Trojans. Data sending Trojans. Security software Disabler Trojans. Destructive Trojans. FTP Trojans.

A Trojan is dangerous to your computer or electronic device. Once embedded into a device, it can wreak havoc on the operating system . The virus secretly hides inside a program or system, and depending on the function of the virus, will release itself expectantly. Trojan viruses serve many purposes from stealing memory to obtaining personal information.

A programmed attack which is implemented in small (meant to be unnoticeable) increments. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. This attack is used for the commission of financial crimes.

A Salami Attack is a series of minor data-security. For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack. Crimes involving Salami Attacks typically are difficult to detect and trace.

Do not open unknown attachments in emails or virus scan after opening them. Download files only from trusted sites. Remember to do a virus scan for them after peripheral devices are connected to your computer.
10

Viruses are dangerous. Research any new viruses you hear about to make sure that the threat is real, if it is make sure your virus scanner is up to date.

11

Beware of the files that you have download because it can cause virus on your computer system.

12

www.ehow.com www.scribd.com www.combofix.com www.wikihow.com

13

S-ar putea să vă placă și