THE TROJAN HORSE
AngeL SoPhiE
WHAT IS TROJAN HORSE?
A destructive program that
masquerades as a benign application.
Unlike viruses, Trojan horses do not
replicate themselves but they can be just
as destructive. One of the most insidious
types of Trojan horse is a program that
claims to rid your computer of viruses but
instead introduces viruses onto your
computer.
AngeL SoPhiE
PURPOSE & USES
A Trojan may give a hacker remote access to
a targeted computer system. Operations that could be
performed by a hacker on a targeted computer
system may include:
•
•
•
•
•
•
•
•
•

Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service attacks)
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card information)
Installation of software, including thirdparty malware and ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
AngeL SoPhiE
Trojan horses are broken down in
classification based on how they
breach systems and the damage
they cause.

AngeL SoPhiE
MAIN TYPES OF TROJAN
HORSES

AngeL SoPhiE
1. REMOTE ACCESS TROJANS
is one of seven major types of
Trojan horse designed to
provide the attacker with
complete control of the victim's
system.

AngeL SoPhiE
2. DATA SENDING TROJANS
is type of a Trojan horse that
is designed to provide the
attacker with sensitive
data such as passwords,
credit card information, log
files, e-mail address or
IM contact lists.
AngeL SoPhiE
3. DESTRUCTIVE TROJANS
is type of a Trojan horse to
destroy and delete files, and is
more like a virus than any
other Trojan

AngeL SoPhiE
4. PROXY TROJANS
is type of a Trojan
horse designed to use the
victim's computer as a proxy
server.

AngeL SoPhiE
5. FILE TRANSFER PROTOCOL
(FTP) TROJANS
is type of a Trojan horse designed
to open port 21 (the port
for FTP transfer) and lets the
attacker connect to
your computer using File Transfer
Protocol (FTP).
AngeL SoPhiE
6. SECURITY SOFTWARE
DISABLER TROJANS
is type of a Trojan horse
designed stop or
kill security programs such as an
antivirus
program or firewall without the
user knowing.
AngeL SoPhiE
7. DENIAL OF SERVICE (DoS)
ATTACK TROJANS
is type of attack on a network that
is designed to bring the network
to its knees by flooding it with
useless traffic.

AngeL SoPhiE
PROTECTING
YOURSELF FROM
TROJAN HORSES

AngeL SoPhiE
There are several things
you can do to protect
yourself from Trojan
horses….

AngeL SoPhiE
•

Never open any e-mails or download any
attachments from unknown senders.

•

Installing antivirus software will also scan
every file you download.

•

If you ever find your computer has been
infected with a Trojan, you should disconnect
your Internet connection and remove the files
in question with an antivirus program or by
reinstalling your operating system.

•

You can call your computer's manufacturer,
your local computer store or a knowledgeable
friend if you need help.
AngeL SoPhiE
reference
• Wikipedia.org
• How Stuff Works

AngeL SoPhiE

The Trojan Horse (Computing)

  • 1.
  • 2.
    WHAT IS TROJANHORSE? A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. AngeL SoPhiE
  • 3.
    PURPOSE & USES ATrojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: • • • • • • • • • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including thirdparty malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging AngeL SoPhiE
  • 4.
    Trojan horses arebroken down in classification based on how they breach systems and the damage they cause. AngeL SoPhiE
  • 5.
    MAIN TYPES OFTROJAN HORSES AngeL SoPhiE
  • 6.
    1. REMOTE ACCESSTROJANS is one of seven major types of Trojan horse designed to provide the attacker with complete control of the victim's system. AngeL SoPhiE
  • 7.
    2. DATA SENDINGTROJANS is type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. AngeL SoPhiE
  • 8.
    3. DESTRUCTIVE TROJANS istype of a Trojan horse to destroy and delete files, and is more like a virus than any other Trojan AngeL SoPhiE
  • 9.
    4. PROXY TROJANS istype of a Trojan horse designed to use the victim's computer as a proxy server. AngeL SoPhiE
  • 10.
    5. FILE TRANSFERPROTOCOL (FTP) TROJANS is type of a Trojan horse designed to open port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP). AngeL SoPhiE
  • 11.
    6. SECURITY SOFTWARE DISABLERTROJANS is type of a Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. AngeL SoPhiE
  • 12.
    7. DENIAL OFSERVICE (DoS) ATTACK TROJANS is type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. AngeL SoPhiE
  • 13.
  • 14.
    There are severalthings you can do to protect yourself from Trojan horses…. AngeL SoPhiE
  • 15.
    • Never open anye-mails or download any attachments from unknown senders. • Installing antivirus software will also scan every file you download. • If you ever find your computer has been infected with a Trojan, you should disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. • You can call your computer's manufacturer, your local computer store or a knowledgeable friend if you need help. AngeL SoPhiE
  • 16.
    reference • Wikipedia.org • HowStuff Works AngeL SoPhiE