Professional Documents
Culture Documents
NAME: HEAZEL A/P JITI Click to edit Master subtitle style I/C NO:950803-13-5080 INDEX NO:WB032A089
5/27/12
CONTENT
TITLE WHAT IS VIRUS How viruses spread Viruses escape detection Infection occurs Trojan horse Salami attack Conclusion Source of reference MENU 5/27/12 PAGE
WHAT IS VIRUS
A virus is a small infectious agent that can replicate only inside the living cells of organisms. Viruses infect all types of organisms, from animals and plants to bacteria and archaea Virus particles (known as virions) consist of two or three parts: the genetic material made from either DNA or RNA, long molecules that carry genetic information; a protein coat that protects these genes; and in some cases an envelope of lipids that surrounds the protein coat when they are outside a MENU 5/27/12 cell.
INFECTION OCCURS
In order to infect a computer, a virus has tohave the chance to execute its code Viruses usually ensure that this happens bybehaving like a parasite, by modifyinganother item so that the virus code isexecuted when the legitimate item is run oropened. As long as the virus is active on the computer,it can copy itself to other files or disks that areaccessed
5/27/12
MENU
TROJAN HORSE
TROJAN HORSE:
A Trojan horse, or Trojan, is a standalone malicious file or program that does not attempt to inject itself into other files unlike a computer virus and often masquerades as a legitimate file or program. Trojan horses can make copies of themselves, steal information, or harm their host computer systems.[1] The term is derived from the Trojan Horse story in Greek mythology because the first and many current Trojan horses attempt to appear as helpful programs. Others rely on drive-by downloads in order to reach target computers.
MENU
5/27/12
SALAMI ATTACK
SALAMI ATTACK:
Salami attack is a series of minordatasecurity attacks thatdata-security attacks thattogether results in a larger attack.together results in a larger attack.For
example, a fraud activity in aFor example, a fraud activity in abank where an employed steals abank where an employed steals asmall amount of funds from severalsmall amount of funds from severalaccounts, can be considered aaccounts, can be considered a salami attack.Crimes involving salami attacksCrimes involving salami attackstypically are difficult to detecttypically are difficult to detectand trace.and trace. MENU
5/27/12
CONCLUSION
Install antivirus on your computer. Update your antivirus weekly to make yourcomputer well protected. Scan every file on removable drive before copying them into your computer. Scan the drives manually at least once a week.
MENU 5/27/12
SOURCE OF REFERENCE
MENU
5/27/12