From:- Wan Nur Aisyah bt Wan Zahari 4 server virus
In computer technology, viruses are malicious software programs, a form of malware. By definition, viruses exist on local disk drives and spread from one computer to another through sharing of "infected" files  Definition of virus…..
Viruses are spread mainly by these four ways: Using a floppy diskette from a machine that has a virus.  Downloading a file from the internet (or bulletin board) that contains a virus.  Getting an  e-mail attachment  that contains a virus.  Installing software purchased from a store or mail  warehouse. While this is the rarest of the ways, software vendors have been found to ship their software with viruses (unknown to them of course) on the installation diskettes/cd-roms.
Example of virus Data diddling   Salami attack   Internet time theft   Logic bomb   Virus / worm attack   Trojan attack   Cyber pornography
Trojan Horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it  According to some people, a virus is a particular case of a Trojan Horse, namely one that is able to spread to other programs  A simple example of a trojan horse would be a program named "waterfalls.scr" claiming to be a free waterfall screensaver which, when run, instead would allow access to the user's computer remotely. About trojan horse
Types of Trojan horse payloads  Trojan horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach systems and the damage they cause.  The nine main types of Trojan horse payloads are: Remote Access  Data Destructive Email Sending  Downloader  Proxy Trojan (disguising others as the infected computer)  FTP Trojan (adding or copying data from the infected computer)  security software disabler  denial-of-service  attack (DoS)  URL trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
Definition of salami attack This attack is used for the commission of financial crimes
The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money from the   account of every customer   Why Salami Attacks Persist  Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large numbers are to be combined with small ones.
Computer virus can affect the computer system. It can copy itself and infect a computer without permission or knowledge of the user. Conclusion
http://www.iriscan.com/basic.htm http://biometrics.cse.msu.edu/fingerprint.htnl   Reference
THE END THANK YOU…….

More Related Content

PPT
Ict H A C K I N G
PPT
Virus-trojan and salami attacks
PPTX
Impact of ict on siocety virus
PPTX
Virus (Trojan Horse and Salami Attack)
PPTX
Impact of ict on society virus
PPTX
Presentation Virus (salami attack and trojan horse)
PPTX
Trojan virus & backdoors
PPT
The Trojan Horse (Computing)
Ict H A C K I N G
Virus-trojan and salami attacks
Impact of ict on siocety virus
Virus (Trojan Horse and Salami Attack)
Impact of ict on society virus
Presentation Virus (salami attack and trojan horse)
Trojan virus & backdoors
The Trojan Horse (Computing)

What's hot (19)

PPTX
Salami attack
PPT
Trojan Horse Virus
DOCX
Case study
PPT
Ict Assignment
PPTX
Torjan horse virus
PPTX
Seminar On Trojan Horse
PPTX
Trojan horse and salami attack
PPTX
Cyber Attacks
PPTX
Security & threats Presentation => (Presenter: Komal Mehfooz)
PPTX
Access control attacks by Yaakub bin Idris
PPTX
The trojan horse virus
PPT
Trojan Horse Presentation
PPTX
BackDoors Seminar
PPTX
Cyber crime
PPTX
Ransomware attack
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Trojan Horse Virus and Hacking
PPTX
Access Controls Attacks
Salami attack
Trojan Horse Virus
Case study
Ict Assignment
Torjan horse virus
Seminar On Trojan Horse
Trojan horse and salami attack
Cyber Attacks
Security & threats Presentation => (Presenter: Komal Mehfooz)
Access control attacks by Yaakub bin Idris
The trojan horse virus
Trojan Horse Presentation
BackDoors Seminar
Cyber crime
Ransomware attack
Ethical hacking introduction to ethical hacking
Trojan Horse Virus and Hacking
Access Controls Attacks
Ad

Viewers also liked (16)

PDF
Intellectual Property Crimes CLE
PDF
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
PPTX
Cyber crime
PPTX
Combating Intellectual Property Crime In Nigeria
PPTX
Seurity policy
DOCX
Cyber law cases
PPTX
Intellectual property in cyberspace
PPT
Intellectual Property Crimes : Research Tools & Strategies
PDF
Cyber Harassment
PDF
IT Act 2000 Penalties, Offences with case studies
PPTX
Information technology act 2000
PPT
Phishing attacks ppt
PPT
Copyright Law and Trademark Law in Cyberspace
PPTX
Cybercrime.ppt
PPTX
Intellectual property rights in cyberspace
PPT
P H I S H I N G
Intellectual Property Crimes CLE
Diskursus Etika Bisnis Islam Dalam Dinamika Bisnis Kontemporer
Cyber crime
Combating Intellectual Property Crime In Nigeria
Seurity policy
Cyber law cases
Intellectual property in cyberspace
Intellectual Property Crimes : Research Tools & Strategies
Cyber Harassment
IT Act 2000 Penalties, Offences with case studies
Information technology act 2000
Phishing attacks ppt
Copyright Law and Trademark Law in Cyberspace
Cybercrime.ppt
Intellectual property rights in cyberspace
P H I S H I N G
Ad

Similar to Presentation1 (20)

PPT
Virus (Trojan Horse,Salami Attack)
PPTX
virus salami attack and trojan horse
PPTX
PPTX
Computer virus
PPT
Cyber-Security-CIT good for 1st year engineering students
PPTX
Security threats
PDF
Information security
PPTX
Network security .pptx
PPT
Trojan Backdoors
PPTX
MALWARE AND ITS TYPES
PPTX
Details of Malwareand Their Types with pptx
PDF
CS111-PART 7 (MALWARE).pdf
PDF
Malware Infections
DOC
Malware
DOC
Malware
PPTX
VIRUS BY CHIRO
PPTX
Ethical hacking trojans, worms and spyware
PPT
networkmanagementandsecurity-160406183558.ppt
PPT
Network management and security
PPTX
viruses.pptx
Virus (Trojan Horse,Salami Attack)
virus salami attack and trojan horse
Computer virus
Cyber-Security-CIT good for 1st year engineering students
Security threats
Information security
Network security .pptx
Trojan Backdoors
MALWARE AND ITS TYPES
Details of Malwareand Their Types with pptx
CS111-PART 7 (MALWARE).pdf
Malware Infections
Malware
Malware
VIRUS BY CHIRO
Ethical hacking trojans, worms and spyware
networkmanagementandsecurity-160406183558.ppt
Network management and security
viruses.pptx

Recently uploaded (20)

PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
Geologic Time for studying geology for geologist
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
August Patch Tuesday
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Five Habits of High-Impact Board Members
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Modernising the Digital Integration Hub
Getting started with AI Agents and Multi-Agent Systems
Taming the Chaos: How to Turn Unstructured Data into Decisions
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
STKI Israel Market Study 2025 version august
Benefits of Physical activity for teenagers.pptx
Unlock new opportunities with location data.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Geologic Time for studying geology for geologist
A novel scalable deep ensemble learning framework for big data classification...
Developing a website for English-speaking practice to English as a foreign la...
CloudStack 4.21: First Look Webinar slides
August Patch Tuesday
Module 1.ppt Iot fundamentals and Architecture
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Five Habits of High-Impact Board Members
Group 1 Presentation -Planning and Decision Making .pptx
Chapter 5: Probability Theory and Statistics
O2C Customer Invoices to Receipt V15A.pptx
Modernising the Digital Integration Hub

Presentation1

  • 1. From:- Wan Nur Aisyah bt Wan Zahari 4 server virus
  • 2. In computer technology, viruses are malicious software programs, a form of malware. By definition, viruses exist on local disk drives and spread from one computer to another through sharing of "infected" files Definition of virus…..
  • 3. Viruses are spread mainly by these four ways: Using a floppy diskette from a machine that has a virus. Downloading a file from the internet (or bulletin board) that contains a virus. Getting an e-mail attachment that contains a virus. Installing software purchased from a store or mail warehouse. While this is the rarest of the ways, software vendors have been found to ship their software with viruses (unknown to them of course) on the installation diskettes/cd-roms.
  • 4. Example of virus Data diddling Salami attack Internet time theft Logic bomb Virus / worm attack Trojan attack Cyber pornography
  • 5. Trojan Horse is a program that does something undocumented which the programmer intended, but that the user would not approve of if he knew about it According to some people, a virus is a particular case of a Trojan Horse, namely one that is able to spread to other programs A simple example of a trojan horse would be a program named "waterfalls.scr" claiming to be a free waterfall screensaver which, when run, instead would allow access to the user's computer remotely. About trojan horse
  • 6. Types of Trojan horse payloads Trojan horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach systems and the damage they cause. The nine main types of Trojan horse payloads are: Remote Access Data Destructive Email Sending Downloader Proxy Trojan (disguising others as the infected computer) FTP Trojan (adding or copying data from the infected computer) security software disabler denial-of-service attack (DoS) URL trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
  • 7. Definition of salami attack This attack is used for the commission of financial crimes
  • 8. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money from the account of every customer Why Salami Attacks Persist Computer computations are notoriously subject to small errors involving rounding and truncation, especially when large numbers are to be combined with small ones.
  • 9. Computer virus can affect the computer system. It can copy itself and infect a computer without permission or knowledge of the user. Conclusion
  • 11. THE END THANK YOU…….