The Trojan Horse (Computing)

16
THE TROJAN HORSE AngeL SoPhiE

Transcript of The Trojan Horse (Computing)

Page 1: The Trojan Horse (Computing)

THE TROJAN HORSE

AngeL SoPhiE

Page 2: The Trojan Horse (Computing)

WHAT IS TROJAN HORSE?

A destructive program that masquerades as a

benign application. Unlike viruses, Trojan

horses do not replicate themselves but they

can be just as destructive. One of the most

insidious types of Trojan horse is a program

that claims to rid your computer of viruses but

instead introduces viruses onto your computer.

AngeL SoPhiE

Page 3: The Trojan Horse (Computing)

PURPOSE & USESA Trojan may give a hacker remote access to

a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include:

• Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)

• Crashing the computer

• Blue screen of death

• Electronic money theft

• Data theft (e.g. retrieving passwords or credit card information)

• Installation of software, including third-party malware and ransomware

• Downloading or uploading of files on the user's computer

• Modification or deletion of files

• Keystroke loggingAngeL SoPhiE

Page 4: The Trojan Horse (Computing)

Trojan horses are broken down in classification based on how they breach systems and the damage they cause.

AngeL SoPhiE

Page 5: The Trojan Horse (Computing)

MAIN TYPES OF TROJAN HORSES

AngeL SoPhiE

Page 6: The Trojan Horse (Computing)

is one of seven major types of Trojan horse designed to provide the attacker with

complete control of the victim's system.

1. REMOTE ACCESS TROJANS

AngeL SoPhiE

Page 7: The Trojan Horse (Computing)

is type of a Trojan horse that is designed to provide the

attacker with sensitive data such as passwords,

credit card information, log files, e-mail address or

IM contact lists.

2. DATA SENDING TROJANS

AngeL SoPhiE

Page 8: The Trojan Horse (Computing)

is type of a Trojan horse to destroy and delete files, and is

more like a virus than any other Trojan

3. DESTRUCTIVE TROJANS

AngeL SoPhiE

Page 9: The Trojan Horse (Computing)

is type of a Trojan horse designed to use the

victim's computer as a proxy server.

4. PROXY TROJANS

AngeL SoPhiE

Page 10: The Trojan Horse (Computing)

is type of a Trojan horse  designed to open port 21 (the port

for FTP transfer) and lets the attacker connect to

your computer using File Transfer Protocol (FTP).

5. FILE TRANSFER PROTOCOL (FTP) TROJANS

AngeL SoPhiE

Page 11: The Trojan Horse (Computing)

is type of a Trojan horse  designed stop or

kill security programs such as an antivirus

program or firewall without the user knowing.

6. SECURITY SOFTWARE DISABLER TROJANS

AngeL SoPhiE

Page 12: The Trojan Horse (Computing)

is type of attack on a network that is designed to bring the network

to its knees by flooding it with useless traffic.

7. DENIAL OF SERVICE (DoS) ATTACK TROJANS

AngeL SoPhiE

Page 13: The Trojan Horse (Computing)

PROTECTING YOURSELF FROM TROJAN HORSES

AngeL SoPhiE

Page 14: The Trojan Horse (Computing)

There are several things you can do to protect yourself from Trojan

horses….

AngeL SoPhiE

Page 15: The Trojan Horse (Computing)

• Never open any e-mails or download any attachments from unknown senders.

• Installing antivirus software will also scan every file you download.

• If you ever find your computer has been infected with a Trojan, you should disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system.

• You can call your computer's manufacturer, your local computer store or a knowledgeable friend if you need help.

AngeL SoPhiE

Page 16: The Trojan Horse (Computing)

reference

• Wikipedia.org• How Stuff Works

AngeL SoPhiE