SlideShare uma empresa Scribd logo
1 de 10
Impact Of ict on society Computer Virus
ContentS Presentation Details Virus Types Of Virus Trojan Horse Salami Attack Conclusion Sources Of Reference
Presentation details Made by: Alvin Cassidy Lajangang Associated by: Nick Walch Walton Pius Kundayis Muazam Jan Eldear Number Of Slides: 10 slides
Virus In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to anothersharing of infected files It also has the ability to affect the normal operation of a computer system.
Types of Virus Trojan Horse Salami Attack
Trojan horse A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function)steals information or harms the system.[1] The term is derived from the Trojan Horse story in Greek mythology.
Salami Attack Salami attack is an attack on a computer network. Involves the intrudersiphoning off small amounts of money from a fileand placing them in another file that he or she can access. Would add a small amount to a debit which the account holder would not check. The name Salami Attack comes from the fact that salami is cut into a very thin sliceswhich refers the money in the account stolen bit by bit.
Conclusion Trojan Horse   We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly. Salami Attack Analyze the source code. Find indications of an attack. Do not ignore what appear to be errors in computer.
Sources of references http://www.scribd.com/doc/13599022/Impact-of-ICT-on-Society http://en.wikipedia.org/wiki/Salami_slicing http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.slideshare.net/Ferellica/virus-trojan-horsesalami-attack-1225194
Thank you Thank you

Mais conteúdo relacionado

Mais procurados

Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
ariifuddin
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
Angel Sophie
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
mridulahuja
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
Hafizra Mas
 

Mais procurados (19)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Presentation1
Presentation1Presentation1
Presentation1
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Backdoor
BackdoorBackdoor
Backdoor
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Dickmaster
DickmasterDickmaster
Dickmaster
 

Semelhante a Impact of ict on siocety virus

virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
siti zulaikha
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
NORTHCUSTOMS
 

Semelhante a Impact of ict on siocety virus (20)

Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
virus
  virus  virus
virus
 
Malware
MalwareMalware
Malware
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
virus
virusvirus
virus
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
Virus
VirusVirus
Virus
 
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptxpresentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
presentationbymohakjainonviruses-150215032337-conversion-gate01 (1).pptx
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 

Impact of ict on siocety virus

  • 1. Impact Of ict on society Computer Virus
  • 2. ContentS Presentation Details Virus Types Of Virus Trojan Horse Salami Attack Conclusion Sources Of Reference
  • 3. Presentation details Made by: Alvin Cassidy Lajangang Associated by: Nick Walch Walton Pius Kundayis Muazam Jan Eldear Number Of Slides: 10 slides
  • 4. Virus In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to anothersharing of infected files It also has the ability to affect the normal operation of a computer system.
  • 5. Types of Virus Trojan Horse Salami Attack
  • 6. Trojan horse A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function)steals information or harms the system.[1] The term is derived from the Trojan Horse story in Greek mythology.
  • 7. Salami Attack Salami attack is an attack on a computer network. Involves the intrudersiphoning off small amounts of money from a fileand placing them in another file that he or she can access. Would add a small amount to a debit which the account holder would not check. The name Salami Attack comes from the fact that salami is cut into a very thin sliceswhich refers the money in the account stolen bit by bit.
  • 8. Conclusion Trojan Horse We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly. Salami Attack Analyze the source code. Find indications of an attack. Do not ignore what appear to be errors in computer.
  • 9. Sources of references http://www.scribd.com/doc/13599022/Impact-of-ICT-on-Society http://en.wikipedia.org/wiki/Salami_slicing http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.slideshare.net/Ferellica/virus-trojan-horsesalami-attack-1225194