You are on page 1of 10

Group

Kam

Member

poh sang Royson Adrian Beriak Kam Siew Poo Liaw Jun Hoo

A computer virus is a computer program that can copyitself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in someform of executable code) when its host is taken to the targetcomputer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive. The term is derived from the Greek myth of the Trojan War, in which the Greeks gave a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. However, after the Trojans dragged the horse inside their city walls, the Greek soldiers sneaked out of the horse's hollow belly to open the city gates and allowed their compatriots to pour in, capturing Troy

computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

A virus is a program that can infect other programs by modifying them. Modification includes a copy of the virus program, which may infect other programs. Computer virus has similarity with biological virus, a biological virus infects the machinery responsible for the living cell to work and a computer virus carries in its instructional code the recipe for making perfect copies of it.

The typical virus takes temporary control of the computer`s disk operating system. Then, whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the virus passes into the new program. Thus, the infection can be spread from computer to computer by unsuspecting users who either swap disks or send programs to one another over a network. In a network environment the ability to access applications and system services on other computers provides a perfect way to replicate itself.

.This attack is used for the commission of financial crimes.

.The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. .Example , a bank employee inserts a program into
the bank's servers, that deducts a small amount of money from the account of every customer.

.No single account holder will probably notice this


unauthorized debit, but the bank employee will make a sizable amount of money every month.

Install

antivirus on computer. Update your antivirus weekly to make your computer well protected. Scan the drives manually atleast once a week.

. Scan every file on removeable drive before


coping them into your computer .

http://en.wikipedia.org/wiki/Computer_worm http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://www.articlesbase.com/software-articles/virus-trap-door293429.html http://www.scribd.com/doc/13503439/VirusTrojan-HorseSalamiAttack

You might also like