Professional Documents
Culture Documents
Compute R Virus: By: Najla Alysha: Nur Farahin 4 Khawarizmi
Compute R Virus: By: Najla Alysha: Nur Farahin 4 Khawarizmi
Compute R Virus: By: Najla Alysha: Nur Farahin 4 Khawarizmi
R VIRUS
BY : NAJLA ALYSHA
: NUR FARAHIN
4 KHAWARIZMI
WHAT IS
COMPUTER
VIRUS?
TYPE OF
COMPUTER
VIRUS
TROJAN
HORSE
SALAMI
ATTACK!
TROJAN HORSE
A destructive program that masquerades as a benign application.
Unlike viruses, Trojan horses do not replicate themselves but they can be just
as destructive.
One of the most insidious types of Trojan horse is a program that claims to rid
your computer of viruses but instead introduces viruses onto your computer.
DELETIN
G DATA
BLOCKIN
G DATA
COPYIN
G DATA
MODIFYIN
G DATA
SALAMI
ATTACK!!
A series of minor data-security attacks that
together results in a larger attack.
For example, a fraud activity in a bank where an
employee steals a small amount of funds from
several accounts, can be considered a salami
attack.
Crimes involving salami attacks typically are
difficult to detect and trace.
Computer virus
can slow down
your computer.
Can take
control by
someone else
CONCLUSION
Download antivirus to
protect your computer from
virus.
RETRIEVED FROM :
https://en.wikipedia.org/wiki/Computer_virus
webopedia.com/TERM/T/Trojan_horse.html
http://usa.kaspersky.com/internet-security-
center/threats/trojans#.VrA5o49OKNY
http://security.stackexchange.com/questions/76070/what-is-asalami-attack
ON 2 FEBRUARY 2016