Virus Trojan Horse and Salami Attack.

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

VIRUS : 

VIRUS TROJAN HORSE AND SALAMI ATTACK

INTRODUCTION : 

INTRODUCTION What is virus?? In computer, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.

TYPES OF VIRUSES : 

TYPES OF VIRUSES Trojan Horse Salami Attack Worm Trapdoor or Backdoor Logic Bomb Theft Hacking Natural and Environmental Threats

TROJAN HORSE : 

TROJAN HORSE What is Trojan Horse?? In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data It is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution Trojan Horse attacks pose one of the most serious threats to computer security

TYPES OF TROJAN HORSE : 

TYPES OF TROJAN HORSE Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-service attack(DoS)Trojans

HOW DID I GET INFECTED ?? : 

HOW DID I GET INFECTED ?? Trojans are executable programs, which means that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like "exe", "vbs", "com", "bat", etc. Some actual trojan filenames include: "dmsetup.exe" and "LOVE-LETTER-FOR-YOU.TXT.vbs"

HOW DO I GET RID OF TROJANS?? : 

HOW DO I GET RID OF TROJANS?? Clean Re-installation: Although arduous, this will always be the only sure way to eradicate a trojan or virus. Back up your entire hard disk, reformat the disk, re-install the operating system and all your applications from original CDs, and finally, if you're certain they are not infected, restore your user files from the backup. Anti-Virus Software: Some of these can handle most of the well known trojans, but none are perfect, no matter what their advertising claims. You absolutely MUST make sure you have the very latest update files for your programs, or else they will miss the latest trojans.

SALAMI ATTACK : 

SALAMI ATTACK What is Salami attack A salami attack is a series of minor data-security attacks that together results in a larger attack. For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack. Crimes involving salami attacks typically are difficult to detect and trace.

THE SALAMI ANALOGY : 

THE SALAMI ANALOGY One perspective depicts taking such thin slices off the end of a salami that there is no noticeable difference in its overall size The perpetrator, who did the slicing, then sneaks away with the stolen pieces. From another angle, the perpetrator deceptively .acquires a whole salami

SALAMI TECHNIQUE IN INFORMATION GATHERING : 

SALAMI TECHNIQUE IN INFORMATION GATHERING The salami technique can also refer to aggregating small amounts of information from many sources to derive an overall picture of an organization. For instance, information from a company's web site, advertisements, trash deposits, media reports, incidents viewed first-hand, or stolen document could be used to build a large database.

CONCLUSIONS : 

CONCLUSIONS Viruses are dangerous. You can maintain a relatively safe computer with a little bit of understanding and vigilance. Research any new viruses you hear about to make sure that the threat is real, if it is make sure your virus scanner is up to date.

REFERENCES : 

REFERENCES Internet http://www.irchelp.org/irchelp/security/trojan.html http://www.ibls.com/ibls-internet-law-document.aspx?d=2447 http://en,en.wikipedia.org/wiki/Salami attack

Slide 13: 

THANK YOU FOR WATCHING .. v_@ Created by : nana a.k.a husna