3. Presentation details Made by: Alvin Cassidy Lajangang Associated by: Nick Walch Walton Pius Kundayis Muazam Jan Eldear Number Of Slides: 10 slides
4. Virus In computer technology, virus are malicious software program, a form of malware. By definition, viruses exist on local disk and spread from one computer to anothersharing of infected files It also has the ability to affect the normal operation of a computer system.
6. Trojan horse A Trojan horse, is software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function)steals information or harms the system.[1] The term is derived from the Trojan Horse story in Greek mythology.
7. Salami Attack Salami attack is an attack on a computer network. Involves the intrudersiphoning off small amounts of money from a fileand placing them in another file that he or she can access. Would add a small amount to a debit which the account holder would not check. The name Salami Attack comes from the fact that salami is cut into a very thin sliceswhich refers the money in the account stolen bit by bit.
8. Conclusion Trojan Horse We should install an antivirus software to protect our machine and make sure that an up-to-date virus signature file has been applied delete browsing history regularly. Salami Attack Analyze the source code. Find indications of an attack. Do not ignore what appear to be errors in computer.
9. Sources of references http://www.scribd.com/doc/13599022/Impact-of-ICT-on-Society http://en.wikipedia.org/wiki/Salami_slicing http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.slideshare.net/Ferellica/virus-trojan-horsesalami-attack-1225194