0% found this document useful (0 votes)
82 views10 pages

SMK Permas Jaya 3 Virus

This document discusses various types of malware including computer viruses, worms, and Trojan horses. It provides definitions and brief histories of viruses and worms. Computer viruses can copy themselves and spread from computer to computer by infecting files on a network. Worms reside in active memory and duplicate themselves, possibly sending copies to other computers via email or IRC. The document also defines a salami attack and Trojan horses. It concludes by recommending installing antivirus software and keeping virus definitions up to date to protect computers from malware.

Uploaded by

yusairri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views10 pages

SMK Permas Jaya 3 Virus

This document discusses various types of malware including computer viruses, worms, and Trojan horses. It provides definitions and brief histories of viruses and worms. Computer viruses can copy themselves and spread from computer to computer by infecting files on a network. Worms reside in active memory and duplicate themselves, possibly sending copies to other computers via email or IRC. The document also defines a salami attack and Trojan horses. It concludes by recommending installing antivirus software and keeping virus definitions up to date to protect computers from malware.

Uploaded by

yusairri
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 10

SMK Permas Jaya 3 VIRUS

Group member : Sakirin Izad Muzani Anuar Kevin name : MOHAMAD IZAD BIN AZALI i/c : 941016-03-5545

Content
1. Computer virus ??? 2. History 3. Methods to avoid detection
4. What is Worm ??
5. What is Salami Attack

??

6. What is Trojan Horse ??

7. Conclusions 8. References

Computer virus ???


Is a computer program that can copy itself and infect a computer. A true virus can only spread from one computer to another. Viruses can increase their chance of spreading to other computer by infecting file on a network file system. Used as a catch all phrase to include all types of malware, adware, and spyware programs.

History
The Creeper virus was first detected on ARPANET, the forerunner of the internet, in the early 1970s. A program called Rother J was the first computer virus to appear in the wild in 1981.

Methods to avoid detection


Avoiding bait files and other undesirable hosts. Stealth. Self-modification. Encryption with a variable key. Polymorphic code. Metamorphic code.

What is Worm ??
Computer Worms are viruses that reside in the active memory of a computer and duplicate themselves. They may send copies of themselves to other computers, such as through email or Internet Relay Chat (IRC).

What is Salami Attack

??

A salami attack is a series of minor data-security attacks that together results in larger attack. Crimes involving salami attack typically are difficulty to detect and trace.

What is Trojan Horse ??


A Trojan Horse program is a malicious program that pretends to be a begin application; a Trojan Horse program purposefully does something the user does not expect. Many people use the term to refer only to non-replicating malicious program, thus making a distinction between Trojans and viruses.

Conclusions
We should install an anti-virus software to protect our machine and make sure that an up-to-date virus signature file has been applied.

References
http://en.wikipedia.org/w/index http://all net/cid/attack9.3html www.all.net/cid/attack/papers/salami.html www.occure.org/document/hism/522525.html www.nwfusion.com/sletters/2002/0146713 7.html

You might also like