SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Trojan Horse And Salami Attack Name:NurRidwan bin Kuwat Group Member:Tonyak Albert Mani CrishtoperakSumping                     Many ak Thomas
What is Trojan Horse? Trojan Horses are a type of computer program that appear to perform a certain function, but actually perform other, often malicious, actions. They differ from traditional viruses because they do not have the means to automatically replicate. Trojan horses can be classified based on how they breach and damage systems. They are primarily used for unauthorized remote access, mass-mailing spam, data destruction, file transfer, toll-line dialing, and denial-of-service attacks. http://articles.winferno.com/antivirus/trojan-horse/
Example Of Trojan Horse ,[object Object]
http://en.wikipedia.org/wiki/Bifrost_(trojan_horse),[object Object]
 The legend goes that a large wooden horse was left outside the gates of Troy as a peace offering from the Greeks, whom the trojans were at war with. Once inside, the horse burst open to reveal Greek soldiers who then destroyed the city.,[object Object]
How Salami Attack? In the salami technique, cyber criminals steal money or resources a bit at a time. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank’s servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the  cyber criminal will make a sizable amount of money every month. http://blog.appinonline.com/hacking/salami-attack.htm
What is Virus? In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.  http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html
What Is Worm? In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when theiruncontrolled replication consumes system resources, slowing orhalting other tasks. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213386,00.html
Different of Computer Worm ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus Ranjeta Muniandy
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virusCassidy Lajangang
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking IT Department Akre
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 

Was ist angesagt? (19)

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Malware
MalwareMalware
Malware
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Malicious
MaliciousMalicious
Malicious
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
computer virus
computer viruscomputer virus
computer virus
 
Virus
VirusVirus
Virus
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 

Andere mochten auch

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Salami slicing attacks
Salami slicing attacksSalami slicing attacks
Salami slicing attacksXchym Hiệp
 
Nobody knows-except-g4mm4
Nobody knows-except-g4mm4Nobody knows-except-g4mm4
Nobody knows-except-g4mm4Xchym Hiệp
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...José Antonio García Erce
 
Détecter et neutraliser efficacement les cybermenaces !
Détecter et neutraliser efficacement les cybermenaces !Détecter et neutraliser efficacement les cybermenaces !
Détecter et neutraliser efficacement les cybermenaces !Kyos
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Virusesjenniel143
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมChainarong Maharak
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserNew Horizons Bulgaria
 

Andere mochten auch (19)

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Salami slicing attacks
Salami slicing attacksSalami slicing attacks
Salami slicing attacks
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Nobody knows-except-g4mm4
Nobody knows-except-g4mm4Nobody knows-except-g4mm4
Nobody knows-except-g4mm4
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
java con base de datos
java con base de datos java con base de datos
java con base de datos
 
Connection
ConnectionConnection
Connection
 
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...
Comunicación Oral 075. Anemia sector Huesca. SEHH SETH Santiago de Compostela...
 
Détecter et neutraliser efficacement les cybermenaces !
Détecter et neutraliser efficacement les cybermenaces !Détecter et neutraliser efficacement les cybermenaces !
Détecter et neutraliser efficacement les cybermenaces !
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Virus
VirusVirus
Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปมไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
ไวรัสคอมพิวเตอร์ เวิร์ม ม้าโทรจัน สแปม
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the User
 

Ähnlich wie Trojan horse and salami attack

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
Software security
Software securitySoftware security
Software securityjes_d
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 

Ähnlich wie Trojan horse and salami attack (20)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Software security
Software securitySoftware security
Software security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Security threats
Security threatsSecurity threats
Security threats
 
virus
  virus  virus
virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Information security
Information securityInformation security
Information security
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
TIC
TICTIC
TIC
 

Trojan horse and salami attack

  • 1. Trojan Horse And Salami Attack Name:NurRidwan bin Kuwat Group Member:Tonyak Albert Mani CrishtoperakSumping Many ak Thomas
  • 2. What is Trojan Horse? Trojan Horses are a type of computer program that appear to perform a certain function, but actually perform other, often malicious, actions. They differ from traditional viruses because they do not have the means to automatically replicate. Trojan horses can be classified based on how they breach and damage systems. They are primarily used for unauthorized remote access, mass-mailing spam, data destruction, file transfer, toll-line dialing, and denial-of-service attacks. http://articles.winferno.com/antivirus/trojan-horse/
  • 3.
  • 4.
  • 5.
  • 6. How Salami Attack? In the salami technique, cyber criminals steal money or resources a bit at a time. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank’s servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the  cyber criminal will make a sizable amount of money every month. http://blog.appinonline.com/hacking/salami-attack.htm
  • 7. What is Virus? In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213306,00.html
  • 8. What Is Worm? In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. It is common for worms to be noticed only when theiruncontrolled replication consumes system resources, slowing orhalting other tasks. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213386,00.html
  • 9.
  • 10. Chat channels are the main target and the same infection/spreading method is used as above - sending infected files or links to infected websites. Infected file sending is less effective as the recipient needs to confirm receipt, save the file and open it before infection will take place.
  • 11.  
  • 13. Copies itself into a shared folder, most likely located on the local machine. The worm will place a copy of itself in a shared folder under a harmless name. Now the worm is ready for download via the P2P network and spreading of the infected file will continue.