SlideShare a Scribd company logo
THE TROJAN HORSE
AngeL SoPhiE
WHAT IS TROJAN HORSE?
A destructive program that
masquerades as a benign application.
Unlike viruses, Trojan horses do not
replicate themselves but they can be just
as destructive. One of the most insidious
types of Trojan horse is a program that
claims to rid your computer of viruses but
instead introduces viruses onto your
computer.
AngeL SoPhiE
PURPOSE & USES
A Trojan may give a hacker remote access to
a targeted computer system. Operations that could be
performed by a hacker on a targeted computer
system may include:
•
•
•
•
•
•
•
•
•

Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service attacks)
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card information)
Installation of software, including thirdparty malware and ransomware
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
AngeL SoPhiE
Trojan horses are broken down in
classification based on how they
breach systems and the damage
they cause.

AngeL SoPhiE
MAIN TYPES OF TROJAN
HORSES

AngeL SoPhiE
1. REMOTE ACCESS TROJANS
is one of seven major types of
Trojan horse designed to
provide the attacker with
complete control of the victim's
system.

AngeL SoPhiE
2. DATA SENDING TROJANS
is type of a Trojan horse that
is designed to provide the
attacker with sensitive
data such as passwords,
credit card information, log
files, e-mail address or
IM contact lists.
AngeL SoPhiE
3. DESTRUCTIVE TROJANS
is type of a Trojan horse to
destroy and delete files, and is
more like a virus than any
other Trojan

AngeL SoPhiE
4. PROXY TROJANS
is type of a Trojan
horse designed to use the
victim's computer as a proxy
server.

AngeL SoPhiE
5. FILE TRANSFER PROTOCOL
(FTP) TROJANS
is type of a Trojan horse designed
to open port 21 (the port
for FTP transfer) and lets the
attacker connect to
your computer using File Transfer
Protocol (FTP).
AngeL SoPhiE
6. SECURITY SOFTWARE
DISABLER TROJANS
is type of a Trojan horse
designed stop or
kill security programs such as an
antivirus
program or firewall without the
user knowing.
AngeL SoPhiE
7. DENIAL OF SERVICE (DoS)
ATTACK TROJANS
is type of attack on a network that
is designed to bring the network
to its knees by flooding it with
useless traffic.

AngeL SoPhiE
PROTECTING
YOURSELF FROM
TROJAN HORSES

AngeL SoPhiE
There are several things
you can do to protect
yourself from Trojan
horses….

AngeL SoPhiE
•

Never open any e-mails or download any
attachments from unknown senders.

•

Installing antivirus software will also scan
every file you download.

•

If you ever find your computer has been
infected with a Trojan, you should disconnect
your Internet connection and remove the files
in question with an antivirus program or by
reinstalling your operating system.

•

You can call your computer's manufacturer,
your local computer store or a knowledgeable
friend if you need help.
AngeL SoPhiE
reference
• Wikipedia.org
• How Stuff Works

AngeL SoPhiE

More Related Content

What's hot

Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
Malware
MalwareMalware
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
Yassine Aboukir
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
NamanKikani
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
Lokesh Bysani
 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Xss ppt
Xss pptXss ppt
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
Ankit Mistry
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
Vi Tính Hoàng Nam
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
Reddhi Basu
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
PradeepKumar728006
 
What is Tails OS ?
What is Tails OS ?What is Tails OS ?
What is Tails OS ?
PriyanshuPorwal7
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
Abdelhakim Salama
 
Cryptolocker
Cryptolocker Cryptolocker
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
ikmal91
 

What's hot (20)

Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
 
Malware
MalwareMalware
Malware
 
Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?Hacking WebApps for fun and profit : how to approach a target?
Hacking WebApps for fun and profit : how to approach a target?
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
What is malware
What is malwareWhat is malware
What is malware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Xss ppt
Xss pptXss ppt
Xss ppt
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Man in the middle attack .pptx
Man in the middle attack .pptxMan in the middle attack .pptx
Man in the middle attack .pptx
 
What is Tails OS ?
What is Tails OS ?What is Tails OS ?
What is Tails OS ?
 
WannaCry ransomware attack
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attack
 
Cryptolocker
Cryptolocker Cryptolocker
Cryptolocker
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 

Viewers also liked

Trojan Horse
Trojan HorseTrojan Horse
Trojan Horse
eleky
 
TD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsTD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoors
th3prodevelopper
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Sanjana Jain
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
Matt Ford
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
Fariha Khudzri
 
Google wave2010
Google wave2010Google wave2010
Google wave2010
Keisuke Hata
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky ppt
kasmus
 
Google Sky At GSFC
Google Sky At GSFCGoogle Sky At GSFC
Google Sky At GSFC
Alberto Conti
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy
15bunkal
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
GoogleWave
GoogleWave GoogleWave
GoogleWave
Daniele Pauletto
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Rainbow technology doc
Rainbow technology docRainbow technology doc
Rainbow technology doc
Prathyusha Shetty
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
Dr-Ahmed Elkorany
 
Rainbow technology
Rainbow technologyRainbow technology
Rainbow technology
Angad Kumar Singh
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave Introduction
Craig Dickson
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - Presentation
Ivo Neskovic
 
Hashing
HashingHashing
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
Sam Bowne
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
deaneal
 

Viewers also liked (20)

Trojan Horse
Trojan HorseTrojan Horse
Trojan Horse
 
TD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoorsTD3 Drofessional Developper CEH trojans & backdoors
TD3 Drofessional Developper CEH trojans & backdoors
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
 
Google wave2010
Google wave2010Google wave2010
Google wave2010
 
Google sky ppt
Google sky pptGoogle sky ppt
Google sky ppt
 
Google Sky At GSFC
Google Sky At GSFCGoogle Sky At GSFC
Google Sky At GSFC
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
GoogleWave
GoogleWave GoogleWave
GoogleWave
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Rainbow technology doc
Rainbow technology docRainbow technology doc
Rainbow technology doc
 
Gsm jammer
Gsm jammerGsm jammer
Gsm jammer
 
Rainbow technology
Rainbow technologyRainbow technology
Rainbow technology
 
Google Wave Introduction
Google Wave IntroductionGoogle Wave Introduction
Google Wave Introduction
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - Presentation
 
Hashing
HashingHashing
Hashing
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 

Similar to The Trojan Horse (Computing)

It act seminar
It act seminarIt act seminar
It act seminar
Akshay Sharma
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
seth edmond
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
HanhSajiDozonArre
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
virus
  virus  virus
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Ferellica
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
Presentation1
Presentation1Presentation1
Presentation1
aisyah2007
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
Kahir_alrawi
 
All about viruses
All about virusesAll about viruses
All about viruses
Kahir_alrawi
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
Vi Tính Hoàng Nam
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
siti zulaikha
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Case study
Case studyCase study
Case study
IvoNne Hndz
 
virus
virusvirus
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
Atuk4
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
Priyanka Daimary
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
EdwinGervacio2
 

Similar to The Trojan Horse (Computing) (20)

It act seminar
It act seminarIt act seminar
It act seminar
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
virus
  virus  virus
virus
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Presentation1
Presentation1Presentation1
Presentation1
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Case study
Case studyCase study
Case study
 
virus
virusvirus
virus
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 

Recently uploaded

Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

The Trojan Horse (Computing)

  • 2. WHAT IS TROJAN HORSE? A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. AngeL SoPhiE
  • 3. PURPOSE & USES A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: • • • • • • • • • Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks) Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including thirdparty malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging AngeL SoPhiE
  • 4. Trojan horses are broken down in classification based on how they breach systems and the damage they cause. AngeL SoPhiE
  • 5. MAIN TYPES OF TROJAN HORSES AngeL SoPhiE
  • 6. 1. REMOTE ACCESS TROJANS is one of seven major types of Trojan horse designed to provide the attacker with complete control of the victim's system. AngeL SoPhiE
  • 7. 2. DATA SENDING TROJANS is type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. AngeL SoPhiE
  • 8. 3. DESTRUCTIVE TROJANS is type of a Trojan horse to destroy and delete files, and is more like a virus than any other Trojan AngeL SoPhiE
  • 9. 4. PROXY TROJANS is type of a Trojan horse designed to use the victim's computer as a proxy server. AngeL SoPhiE
  • 10. 5. FILE TRANSFER PROTOCOL (FTP) TROJANS is type of a Trojan horse designed to open port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP). AngeL SoPhiE
  • 11. 6. SECURITY SOFTWARE DISABLER TROJANS is type of a Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. AngeL SoPhiE
  • 12. 7. DENIAL OF SERVICE (DoS) ATTACK TROJANS is type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. AngeL SoPhiE
  • 14. There are several things you can do to protect yourself from Trojan horses…. AngeL SoPhiE
  • 15. • Never open any e-mails or download any attachments from unknown senders. • Installing antivirus software will also scan every file you download. • If you ever find your computer has been infected with a Trojan, you should disconnect your Internet connection and remove the files in question with an antivirus program or by reinstalling your operating system. • You can call your computer's manufacturer, your local computer store or a knowledgeable friend if you need help. AngeL SoPhiE
  • 16. reference • Wikipedia.org • How Stuff Works AngeL SoPhiE