Trojan horsies prez

14
threat: Trojan horse Sheen Hunter presents: THE COMPUTER & INTERNET SECURITY PROJECT

description

 

Transcript of Trojan horsies prez

Page 1: Trojan horsies prez

threat: Trojan horse

Sheen Hunter presents:THE COMPUTER & INTERNET

SECURITY PROJECT

Page 2: Trojan horsies prez

TROJAN HORSEThe Trojan Horse

Page 3: Trojan horsies prez

The attack!

Crackers -- hackers who use their computer skills to create mischief or

cause malicious threats intentionally -- can send out Trojans that turn innocent Human’s computer into zombie computers, so-called because

the human with the infected computer rarely knows his/her system is under control. Crackers then use these zombie computers to send out more viruses, eventually creating networks of zombie computers known as botnets.

Page 4: Trojan horsies prez

What does it mean?!Is it Good or Bad?n. A subversive group or device

placed within enemy ranks.The hollow wooden horse in which,

according to legend, Greeks hid and gained entrance to Troy, later opening the gates to their army.

Computer Science. A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.

Page 5: Trojan horsies prez
Page 6: Trojan horsies prez

So… it’s basically a spy!!A Trojan is technically a worm. The threat is hidden/disguised in software that

appears to be useful. (such as virus removal program)

Can access files, folders, or your entire systems by creating a "backdoor" or a “trapdoor "which can be used to send your personal information to another location.

The program can reproduce LIKE a virus and spread to other computers. A virus replicates itself, while a Trojan horse does not.

It can damage, delete, or destroy important files.

Page 7: Trojan horsies prez

How to PROTECT yourself?

•#1 Beware of opening any e-mails or downloading attachments.•Delete e-mail that seems suspicious. •Install an antivirus software and firewall.•Scan every file you download (even if it's from someone you know)•Have a Trojan? Disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. •Call your computer manufacturer if you need extra assistance.

Trusted Antivirus software suites:Avast AntivirusAVG Anti-VirusKaspersky Anti-VirusMcAfee VirusScanNorton AntiVirus

Page 8: Trojan horsies prez

What’s the troubleshooting process?

1!Identify the

Problem

Page 9: Trojan horsies prez

What’s the troubleshooting process?

2!Establish a Theory of

Probable Causes

Page 10: Trojan horsies prez

What’s the troubleshooting process?

3!Determine an Exact Cause

Page 11: Trojan horsies prez

What’s the troubleshooting process?

4!Implement a Solution

Page 12: Trojan horsies prez

What’s the troubleshooting process?

5!Verify Solution and Full System

Functionality

Page 13: Trojan horsies prez

What’s the troubleshooting process?

6!Document Findings

Page 14: Trojan horsies prez

More info: http://technet.microsoft.com/en-us/library/dd632947.aspx

http://technet.microsoft.com/en-us/library/dd632947.aspx

Click icon to add picture