Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh...
-
Upload
dwayne-moore -
Category
Documents
-
view
219 -
download
0
Transcript of Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh...
![Page 1: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/1.jpg)
Trojan HorseTrojan Horse
ITGD 2202
Assistant Professor Assistant Professor Dr. Sana’a Wafa Al-SayeghDr. Sana’a Wafa Al-Sayegh
supervision
Mohammed F. Abu Lamdy
![Page 2: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/2.jpg)
Definition
Types of Trojan Horse
Types of Trojan Horse Payloads
Process
1
2
3
4
Main Category:-
5 How To Avoid From Be Infected
6 How To Remove
7 Conclusion
![Page 3: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/3.jpg)
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user.
A Trojan Horse is a program that installs malicious software while under the guise of doing something else.
DEFINITION
![Page 4: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/4.jpg)
There are two common types of Trojan horses:There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker. A cracker inserts malicious code into the program that executes while the program is used.
Example : crack software ,p2p file sharing utilities.2.Standalone program that masquerades as something
else ,like a game or image file, in order to trick the user into running the program.
Types Of Trojan Horse
![Page 5: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/5.jpg)
There are two types of Trojan Horse :
-Time Bomb and Logic Bomb
-Droppers
Type Of Trojan Horse payloads
![Page 6: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/6.jpg)
1-Time Bomb activate on particular dates and times.
2-Logic Bomb activate on certain condition met by computer.
3-Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time.
Process
![Page 7: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/7.jpg)
Do not open the unexpected attachments on emails
Do not surf to the unknown website.
Do not download anything from the stranger website.
How To Avoid From Be Infected
![Page 8: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/8.jpg)
Use the following tools :
The program is called smitfraudfixsiri.geekstogo.com/SmitfraudFix.php
Just follow the instruction thereDownload Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition
A-SQUAREDemsisoft.com/en/software/free
Anti-spyware comparisonhttp://www.2-spyware.com/compare.php
How To Remove
![Page 9: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/9.jpg)
We need to be careful when download something. We also need an Anti-Malware and anti-virus to protect our computer from be
infected by virus.
We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our
computer with a Trojan or Worm.
Conclusion
![Page 10: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/10.jpg)
Reference
• http://au.answers.yahoo.com/question/index?qid=20070515130138AAlllwf
• http://en.wikipedia.org/wiki/Trojan_horse_(computing)
![Page 11: Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.](https://reader036.fdocuments.in/reader036/viewer/2022082417/56649eab5503460f94bb03b9/html5/thumbnails/11.jpg)