VIRUS : VIRUS TROJAN HORSE AND
SALAMI ATTACK INTRODUCTION : INTRODUCTION What is virus??
In computer, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. TYPES OF VIRUSES : TYPES OF VIRUSES Trojan Horse
Trapdoor or Backdoor
Natural and Environmental Threats TROJAN HORSE : TROJAN HORSE What is Trojan Horse??
In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data
It is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution
Trojan Horse attacks pose one of the most serious threats to computer security TYPES OF TROJAN HORSE : TYPES OF TROJAN HORSE Remote Access Trojans
Data Sending Trojans
Security Software Disabler Trojans
Denial-of-service attack(DoS)Trojans HOW DID I GET INFECTED ?? : HOW DID I GET INFECTED ?? Trojans are executable programs, which means that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like "exe", "vbs", "com", "bat", etc. Some actual trojan filenames include: "dmsetup.exe" and "LOVE-LETTER-FOR-YOU.TXT.vbs" HOW DO I GET RID OF TROJANS?? : HOW DO I GET RID OF TROJANS?? Clean Re-installation: Although arduous, this will always be the only sure way to eradicate a trojan or virus. Back up your entire hard disk, reformat the disk, re-install the operating system and all your applications from original CDs, and finally, if you're certain they are not infected, restore your user files from the backup.
Anti-Virus Software: Some of these can handle most of the well known trojans, but none are perfect, no matter what their advertising claims. You absolutely MUST make sure you have the very latest update files for your programs, or else they will miss the latest trojans. SALAMI ATTACK : SALAMI ATTACK What is Salami attack
A salami attack is a series of minor data-security attacks that together results in a larger attack. For example, a fraud activity in a bank where an employee steals a small amount of funds from several accounts, can be considered a salami attack.
Crimes involving salami attacks typically are difficult to detect and trace. THE SALAMI ANALOGY : THE SALAMI ANALOGY One perspective depicts taking such thin slices off the end of a salami that there is no noticeable difference in its overall size
The perpetrator, who did the slicing, then sneaks away with the stolen pieces. From another angle, the perpetrator deceptively .acquires a whole salami SALAMI TECHNIQUE IN INFORMATION GATHERING : SALAMI TECHNIQUE IN INFORMATION GATHERING The salami technique can also refer to aggregating small amounts of information from many sources to derive an overall picture of an organization.
For instance, information from a company's web site, advertisements, trash deposits, media reports, incidents viewed first-hand, or stolen document could be used to build a large database. CONCLUSIONS : CONCLUSIONS Viruses are dangerous. You can maintain a relatively safe computer with a little bit of understanding and vigilance. Research any new viruses you hear about to make sure that the threat is real, if it is make sure your virus scanner is up to date. REFERENCES : REFERENCES Internet
http://en,en.wikipedia.org/wiki/Salami attack Slide 13: THANK YOU FOR
Created by : nana a.k.a husna