SlideShare a Scribd company logo
1 of 11
SREENIDHI INSTITUTE OF
SCIENCE AND TECHNOLOGY
TROJAN HORSE
By,
S.Vinay
Computer Science and
Engineering
Department
14311A0557
TABLE OF CONTENTS:
 INTRODUCTION
 ETHYMOLOGY
 TYPES OF TROJANS
 HOW TROJAN WORKS
 PURPOSE OF TROJAN
 NOTABLE TROJANS
 PREVENTION
 REFERENCES
INTRODUCTION:
•A destuctive program that installs malicious
softwares in the guise of doing something
else.
•Trojans are different from virus.
•Malicious programs are classified as Trojans if
they do not attempt to inject themselves into
other files or otherwise propagate themselves
•A computer may host a Trojan via a malicious
program that a user is duped into executing.
ETHYMOLOGY
•The term comes from the a Greek story of the
Trojan War,in which the Greeks hide in the
wooden horse inorder to breach the walls of
Troy.
HOW TROJANS WORK:
•A program with Trojan appears to be
legitimate to the user,but as user interacts with
it ,it begins doing various unnecessary actions
•Now the Trojan creates a safe passage for the
attacker to the user and makes the users
computer vulnerable.
•Trojan horses do not replicate themselves but
they can be just as destructive as viruses are.
TYPES OF TROJANS:
Trojan horses are broken down in classification based on
how they breach systems and the damage they cause.
The seven main types of Trojan horses are:
•Remote Access Trojans
•Data Sending Trojans
•Destructive Trojans
•Proxy Trojans
•FTP Trojans
•security software disabler Trojans
•denial-of-service attack (DoS) Trojans
PURPOSE OF TROJANS:
•Crashing the computer
•Data corruption
•Formatting disks, destroying all contents
•Electronic money theft
•Modification or deletion of files
•Watching the user's screen
•Using the infected computer as proxy for
illeagal activities.
NOTABLE TROJANS:
•Netbus Advance System
•Subseven or Sub7
•Back Orifice
•Beast
•Zeus
•Flashback Trojan
•ZeroAccess
•Koobface
•Vundo
PREVENTION:
•Avoid opening unsolicited email from unknown
senders.
•Avoid downloading and installing programs unless
the publisher is trusted.
•Use firewall to block all unsolicited connections.
•Use fully updated anti virus program whenever you
are using the internet.
• http://www.ehow.com
• http://en.wikipedia.org
• http://www.webopedia.com

More Related Content

Viewers also liked (13)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Vinay

Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 
Internet Security
Internet SecurityInternet Security
Internet Security
Manoj Sahu
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
mdameer02
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docx
wlynn1
 

Similar to Vinay (20)

TROJAN HORSE.pptx
TROJAN HORSE.pptxTROJAN HORSE.pptx
TROJAN HORSE.pptx
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
TD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsTD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoors
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer infections and protections(final)
Computer infections and protections(final)Computer infections and protections(final)
Computer infections and protections(final)
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus
  virus  virus
virus
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docx
 
Case study
Case studyCase study
Case study
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Network security .pptx
Network security .pptxNetwork security .pptx
Network security .pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Information security
Information securityInformation security
Information security
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Vinay

  • 1. SREENIDHI INSTITUTE OF SCIENCE AND TECHNOLOGY TROJAN HORSE By, S.Vinay Computer Science and Engineering Department 14311A0557
  • 2. TABLE OF CONTENTS:  INTRODUCTION  ETHYMOLOGY  TYPES OF TROJANS  HOW TROJAN WORKS  PURPOSE OF TROJAN  NOTABLE TROJANS  PREVENTION  REFERENCES
  • 3. INTRODUCTION: •A destuctive program that installs malicious softwares in the guise of doing something else. •Trojans are different from virus. •Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files or otherwise propagate themselves
  • 4. •A computer may host a Trojan via a malicious program that a user is duped into executing.
  • 5. ETHYMOLOGY •The term comes from the a Greek story of the Trojan War,in which the Greeks hide in the wooden horse inorder to breach the walls of Troy.
  • 6. HOW TROJANS WORK: •A program with Trojan appears to be legitimate to the user,but as user interacts with it ,it begins doing various unnecessary actions •Now the Trojan creates a safe passage for the attacker to the user and makes the users computer vulnerable. •Trojan horses do not replicate themselves but they can be just as destructive as viruses are.
  • 7. TYPES OF TROJANS: Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are: •Remote Access Trojans •Data Sending Trojans •Destructive Trojans •Proxy Trojans •FTP Trojans •security software disabler Trojans •denial-of-service attack (DoS) Trojans
  • 8. PURPOSE OF TROJANS: •Crashing the computer •Data corruption •Formatting disks, destroying all contents •Electronic money theft •Modification or deletion of files •Watching the user's screen •Using the infected computer as proxy for illeagal activities.
  • 9. NOTABLE TROJANS: •Netbus Advance System •Subseven or Sub7 •Back Orifice •Beast •Zeus •Flashback Trojan •ZeroAccess •Koobface •Vundo
  • 10. PREVENTION: •Avoid opening unsolicited email from unknown senders. •Avoid downloading and installing programs unless the publisher is trusted. •Use firewall to block all unsolicited connections. •Use fully updated anti virus program whenever you are using the internet.