Trojan horsies prez
-
Upload
studio-sheen -
Category
Technology
-
view
149 -
download
0
description
Transcript of Trojan horsies prez
threat: Trojan horse
Sheen Hunter presents:THE COMPUTER & INTERNET
SECURITY PROJECT
TROJAN HORSEThe Trojan Horse
The attack!
Crackers -- hackers who use their computer skills to create mischief or
cause malicious threats intentionally -- can send out Trojans that turn innocent Human’s computer into zombie computers, so-called because
the human with the infected computer rarely knows his/her system is under control. Crackers then use these zombie computers to send out more viruses, eventually creating networks of zombie computers known as botnets.
What does it mean?!Is it Good or Bad?n. A subversive group or device
placed within enemy ranks.The hollow wooden horse in which,
according to legend, Greeks hid and gained entrance to Troy, later opening the gates to their army.
Computer Science. A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the program was loaded.
So… it’s basically a spy!!A Trojan is technically a worm. The threat is hidden/disguised in software that
appears to be useful. (such as virus removal program)
Can access files, folders, or your entire systems by creating a "backdoor" or a “trapdoor "which can be used to send your personal information to another location.
The program can reproduce LIKE a virus and spread to other computers. A virus replicates itself, while a Trojan horse does not.
It can damage, delete, or destroy important files.
How to PROTECT yourself?
•#1 Beware of opening any e-mails or downloading attachments.•Delete e-mail that seems suspicious. •Install an antivirus software and firewall.•Scan every file you download (even if it's from someone you know)•Have a Trojan? Disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. •Call your computer manufacturer if you need extra assistance.
Trusted Antivirus software suites:Avast AntivirusAVG Anti-VirusKaspersky Anti-VirusMcAfee VirusScanNorton AntiVirus
What’s the troubleshooting process?
1!Identify the
Problem
What’s the troubleshooting process?
2!Establish a Theory of
Probable Causes
What’s the troubleshooting process?
3!Determine an Exact Cause
What’s the troubleshooting process?
4!Implement a Solution
What’s the troubleshooting process?
5!Verify Solution and Full System
Functionality
What’s the troubleshooting process?
6!Document Findings
More info: http://technet.microsoft.com/en-us/library/dd632947.aspx
http://technet.microsoft.com/en-us/library/dd632947.aspx
Click icon to add picture