Your SlideShare is downloading. ×
  • Like
The Trojan Horse (Computing)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

The Trojan Horse (Computing)

  • 501 views
Published

 

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
501
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
43
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. THE TROJAN HORSE AngeL SoPhiE
  • 2. WHAT IS TROJAN HORSE? A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. AngeL SoPhiE
  • 3. PURPOSE & USES A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: • • • • • • • • • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including thirdparty malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging AngeL SoPhiE
  • 4. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. AngeL SoPhiE
  • 5. MAIN TYPES OF TROJAN HORSES AngeL SoPhiE
  • 6. 1. REMOTE ACCESS TROJANS is one of seven major types of Trojan horse designed to provide the attacker with complete control of the victim's system. AngeL SoPhiE
  • 7. 2. DATA SENDING TROJANS is type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. AngeL SoPhiE
  • 8. 3. DESTRUCTIVE TROJANS is type of a Trojan horse to destroy and delete files, and is more like a virus than any other Trojan AngeL SoPhiE
  • 9. 4. PROXY TROJANS is type of a Trojan horse designed to use the victim's computer as a proxy server. AngeL SoPhiE
  • 10. 5. FILE TRANSFER PROTOCOL (FTP) TROJANS is type of a Trojan horse designed to open port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP). AngeL SoPhiE
  • 11. 6. SECURITY SOFTWARE DISABLER TROJANS is type of a Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. AngeL SoPhiE
  • 12. 7. DENIAL OF SERVICE (DoS) ATTACK TROJANS is type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. AngeL SoPhiE
  • 13. PROTECTING YOURSELF FROM TROJAN HORSES AngeL SoPhiE
  • 14. There are several things you can do to protect yourself from Trojan horses…. AngeL SoPhiE
  • 15. • Never open any e-mails or download any attachments from unknown senders. • Installing antivirus software will also scan every file you download. • If you ever find your computer has been infected with a Trojan, you should disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. • You can call your computer's manufacturer, your local computer store or a knowledgeable friend if you need help. AngeL SoPhiE
  • 16. reference • Wikipedia.org • How Stuff Works AngeL SoPhiE