SlideShare una empresa de Scribd logo
1 de 16
THE TROJAN HORSE
AngeL SoPhiE
WHAT IS TROJAN HORSE?
A destructive program that
masquerades as a benign application.
Unlike viruses, Trojan horses do not
replicate themselves but they can be just
as destructive. One of the most insidious
types of Trojan horse is a program that
claims to rid your computer of viruses but
instead introduces viruses onto your
computer.
AngeL SoPhiE
PURPOSE & USES
A Trojan may give a hacker remote access to
a targeted computer system. Operations that could be
performed by a hacker on a targeted computer
system may include:
•
•
•
•
•
•
•
•
•

Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service attacks)
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card information)
Installation of software, including thirdparty malware and ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
AngeL SoPhiE
Trojan horses are broken down in
classification based on how they
breach systems and the damage
they cause.

AngeL SoPhiE
MAIN TYPES OF TROJAN
HORSES

AngeL SoPhiE
1. REMOTE ACCESS TROJANS
is one of seven major types of
Trojan horse designed to
provide the attacker with
complete control of the victim's
system.

AngeL SoPhiE
2. DATA SENDING TROJANS
is type of a Trojan horse that
is designed to provide the
attacker with sensitive
data such as passwords,
credit card information, log
files, e-mail address or
IM contact lists.
AngeL SoPhiE
3. DESTRUCTIVE TROJANS
is type of a Trojan horse to
destroy and delete files, and is
more like a virus than any
other Trojan

AngeL SoPhiE
4. PROXY TROJANS
is type of a Trojan
horse designed to use the
victim's computer as a proxy
server.

AngeL SoPhiE
5. FILE TRANSFER PROTOCOL
(FTP) TROJANS
is type of a Trojan horse designed
to open port 21 (the port
for FTP transfer) and lets the
attacker connect to
your computer using File Transfer
Protocol (FTP).
AngeL SoPhiE
6. SECURITY SOFTWARE
DISABLER TROJANS
is type of a Trojan horse
designed stop or
kill security programs such as an
antivirus
program or firewall without the
user knowing.
AngeL SoPhiE
7. DENIAL OF SERVICE (DoS)
ATTACK TROJANS
is type of attack on a network that
is designed to bring the network
to its knees by flooding it with
useless traffic.

AngeL SoPhiE
PROTECTING
YOURSELF FROM
TROJAN HORSES

AngeL SoPhiE
There are several things
you can do to protect
yourself from Trojan
horses….

AngeL SoPhiE
•

Never open any e-mails or download any
attachments from unknown senders.

•

Installing antivirus software will also scan
every file you download.

•

If you ever find your computer has been
infected with a Trojan, you should disconnect
your Internet connection and remove the files
in question with an antivirus program or by
reinstalling your operating system.

•

You can call your computer's manufacturer,
your local computer store or a knowledgeable
friend if you need help.
AngeL SoPhiE
reference
• Wikipedia.org
• How Stuff Works

AngeL SoPhiE

Más contenido relacionado

La actualidad más candente

Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & KeyloggersJithin James
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesFaizan Shaikh
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 

La actualidad más candente (20)

What is malware
What is malwareWhat is malware
What is malware
 
Malware
MalwareMalware
Malware
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Attacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell PhonesAttacks on Mobiles\Cell Phones
Attacks on Mobiles\Cell Phones
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 

Destacado

Trojan Horse
Trojan HorseTrojan Horse
Trojan Horseeleky
 
TD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsTD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsth3prodevelopper
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tacticsFariha Khudzri
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky pptkasmus
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy15bunkal
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave IntroductionCraig Dickson
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationIvo Neskovic
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksSam Bowne
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interfacedeaneal
 

Destacado (20)

Trojan Horse
Trojan HorseTrojan Horse
Trojan Horse
 
TD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsTD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoors
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
 
Google wave2010
Google wave2010Google wave2010
Google wave2010
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky ppt
 
Google Sky At GSFC
Google Sky At GSFCGoogle Sky At GSFC
Google Sky At GSFC
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
GoogleWave
GoogleWave GoogleWave
GoogleWave
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Rainbow technology doc
Rainbow technology docRainbow technology doc
Rainbow technology doc
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Rainbow technology
Rainbow technologyRainbow technology
Rainbow technology
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave Introduction
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - Presentation
 
Hashing
HashingHashing
Hashing
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 

Similar a Trojan Horse Types & Protection

Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,Kahir_alrawi
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101Atuk4
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 

Similar a Trojan Horse Types & Protection (20)

It act seminar
It act seminarIt act seminar
It act seminar
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
virus
  virus  virus
virus
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Presentation1
Presentation1Presentation1
Presentation1
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Case study
Case studyCase study
Case study
 
virus
virusvirus
virus
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Trojan Horse Types & Protection

  • 2. WHAT IS TROJAN HORSE? A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. AngeL SoPhiE
  • 3. PURPOSE & USES A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: • • • • • • • • • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including thirdparty malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging AngeL SoPhiE
  • 4. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. AngeL SoPhiE
  • 5. MAIN TYPES OF TROJAN HORSES AngeL SoPhiE
  • 6. 1. REMOTE ACCESS TROJANS is one of seven major types of Trojan horse designed to provide the attacker with complete control of the victim's system. AngeL SoPhiE
  • 7. 2. DATA SENDING TROJANS is type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. AngeL SoPhiE
  • 8. 3. DESTRUCTIVE TROJANS is type of a Trojan horse to destroy and delete files, and is more like a virus than any other Trojan AngeL SoPhiE
  • 9. 4. PROXY TROJANS is type of a Trojan horse designed to use the victim's computer as a proxy server. AngeL SoPhiE
  • 10. 5. FILE TRANSFER PROTOCOL (FTP) TROJANS is type of a Trojan horse designed to open port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP). AngeL SoPhiE
  • 11. 6. SECURITY SOFTWARE DISABLER TROJANS is type of a Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. AngeL SoPhiE
  • 12. 7. DENIAL OF SERVICE (DoS) ATTACK TROJANS is type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. AngeL SoPhiE
  • 14. There are several things you can do to protect yourself from Trojan horses…. AngeL SoPhiE
  • 15. • Never open any e-mails or download any attachments from unknown senders. • Installing antivirus software will also scan every file you download. • If you ever find your computer has been infected with a Trojan, you should disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. • You can call your computer's manufacturer, your local computer store or a knowledgeable friend if you need help. AngeL SoPhiE
  • 16. reference • Wikipedia.org • How Stuff Works AngeL SoPhiE