Вы находитесь на странице: 1из 7


In computer technology, viruses are malicious software programs, a form of malware. By definition, viruses exist on local disk drives and spread from one computer to another through sharing of "infected" files. Common methods for spreading viruses include floppy disks, FTP file transfers, and copying files between shared network drives.

A Trojan horse, or Trojan, is a standalone malicious program which may give full control of infected PC to another PC . It may also perform typical computer virus activities . Trojan horses may make copies of themselves, steal information, or harm their host computer systems . The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of social engineering, presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers .

Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code

Salami attack an attack on a computer network which involves the intruder siphoning off small amounts of money from a file and placing them in another file that he or she can access ; for example, a file that holds their bank account details. A typical salami attack would add a small amount to a debit which the account holder would not check, such as a debit which represented a service charge. This small increase in debit (often a few pence or a few cents) would then be credited to the perpetrator's bank account. An unsophisticated banking system which just checked that debits and credits matched would be unable to detect this type of fraud. The name salami attack comes from the fact that salami is cut into into very thin slices. It is also known as salami shaving.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Internet http://en.wikipedia.org/wiki/Computer_worm http://www.google.com.my http://www.fileshare.net

Thank you to Sir Loh Sue Fee .