Você está na página 1de 8

IMPACT OF ICT ON

SOCIETY:
VIRUS (TROJAN HORSE,
SALAMI ATTACK).
Done by
Class :
Year :

Definition of virus.
In computer technology, viruses are malicious software
programs, a form of malware. By definition, viruses
exist on local disk and spread from one computer to
another through sharing of infected files.

Viruses are spread manly by these four ways:


1. Using a floppy diskette from a machine that has a
virus.
2. Downloading a file from the Internet (or bulletin
board) that contains a virus.
3. Getting an email attachment that contains a virus.
4. Installing software purchased from a store or mail
warehouse. While this is the rarest of the ways,
software vendors have been found to ship their
software with viruses (unknown to them of course)
on the installations diskettes or CD-ROMs

VIRUS

VIRUS

Example of virus:
1. Data diddling.
2. Salami attack.
3. Internet time theft.
4. Logic bomb.
5. Virus/Worm attack.
6. Trojan Horse attack.
7. Cyber pornography.

TROJAN HORSE

Trojan horse is a program that does something


undocumented which the programmer intended, but that
the user would not approve of if he knew about it.

According to some people, a virus is a particular case


of Trojan Horse, namely one that is able to spread to
other programs.

A simple example of a Trojan Horse would be a program


named waterfalls.scr claiming to be a free waterfall
screensaver which, when run instead would allow access to
the users computer.

TROJAN HORSE

TYPES OF TROJAN HORSE PAYLOADS.

Trojan Horse payloads are almost always designed to


do various harmful things, but could be harmless. They
are broken down in classification based on how they
breach system and the damage they cause:

The eight main types of Trojan Horse payloads are:


1. Remote access.
2. Data destructive email sending.
3. Downloader.
4. Proxy Trojan (disguising others as the infected
computer).
5. FTP Trojan (adding or copying data from the
infected computer).
6. Security software disabler.
7. Denial-of-service attack (DoS).
8. URL Trojan (directing the infected computer to
only connect to the Internet via an expensive dialup connection).

This attack is used for the commission of financial


crimes.
The key here is to make the alteration so insignificant
that in a single case it would go completely unnoticed.
E.g: A bank employees inserts a program into the banks
serves that deducts a small amount of money from the
account of every customer.

SALAMI ATTACK

WHY SALAMI ATTACK PERSIST?


Computer computations are notoriously subject to small
errors involving rounding and truncation, especially when
large number are to be combined with small ones.

Computer

CONCLUSIONS

virus can affect the computer


system. It can copy itself and infect a
computer without permissions or knowledge of
the user.

http://www.iriscan.com/basic.htm
http://www.biometrics.cse.meu.edu/fingerprint

REFERENCES

s.html
http://www.i.are.talk.com/htm
http://www.heart_of_angel.com/virus(trojanhor

se)(salamiattack).htm

Você também pode gostar