SlideShare a Scribd company logo
The Trojan Horse Virus
Table of Contents
2
 Websites and Web Hosting Service
Providers
 Malware
 Trojan Horse
 Trojan’s Actions
 Common Characteristic of all Trojans
 Types of Trojan Horses
 More Types of Trojan Horses
 Some More Types of Trojan Horses
 More Types of Trojan Horses
 Conclusion
 Each are every website that we visit is hosted on the web server of a web hosting
company. These web hosting companies, which are also called web hosts, are
responsible for leasing server space to website owners along with providing them
the services and the technologies that are needed by a website in order to be
accessible.
 When one refers to a “Windows Hosting Company” or to a “Cloud Hosting
Company” or even to the “best Web Hosting Company” in India or even abroad,
one is essentially referring to web hosting service providers.
3
Websites and Web Hosting Service Providers
YELLOW
 It refers to any malicious program that has been designed and installed onto a system with
the intention of harming either the computer, computer network, the server or the user of
these. Computer programs that act covertly to cause damage to data also fall in this
category. It is made up of code that is developed by cybercriminals and its aim is to cause
substantial damage to the data as well as the system that it targets. Its other aim is to
have unauthorized access to a network. Any malware is usually delivered in the form of a
file or a link that is sent over email. It requires the user to click on it, so that the malware
can be executed.
 A huge range of malware types exist. These can be computer viruses, Trojan Horses,
worms, spyware, rogue software, ransomware, adware, wiper and scareware.
 This PPT is aimed at shedding light upon the malware Trojan Horse in particular.
Malware
4
Trojan Horse
 A Trojan Horse or a Trojan is a kind of a malware that is often found in the guise of a
legitimate software. These are used by cybercriminals to gain access to a particular
system. One of its important characteristics is, it remains in the users’ systems covertly
and does not let them find it.
 The targeted user is tricked into loading and eventually triggering the execution of
Trojans on their device. This is achieved by employing some sort of social engineering
mechanism. Once these Trojans have been installed on the user’s system these
facilitate gaining backdoor access to it for spying on the user, stealing his/her
sensitive data along with personal information. These are capable of deleting the
files of a user that are on that system as well as infecting other devices which are
connected to that network.
 Trojans are not able to self-replicate which sets these apart from computer viruses
and worms. 5
Trojan’s Actions
6
Once Trojans are activated these can fulfil the following purposes-
 Copying data
 Deleting data
 Modifying data
 Blocking data
 Hampering the performance of computers or computer networks
Common Characteristic of all Trojans
7
Four of the most common characteristics of every type of Trojan are mentioned
below-
 Fraudulent
 Remains concealed
 Capable of opening terminal automatically by using the communication means
of client-server model
 Can self-repair
Types of Trojan Horses
8
Trojans are of the following types, which are mentioned in no particular order-
 Backdoor
This kind of a Trojan enables remote control over the targeted system by its sender, who has a
malicious purpose. The cybercriminal accesses the legitimate user’s system without him being aware
of it. Once a Backdoor Trojan is installed, it gives total power to the author to do everything that
he/she wishes to do on the infected device. This enables him to do everything that the actual user
can do on his system. These activities include but are not limited to reading data, sending files,
receiving, launching and deleting files along with displaying data and rebooting the computer.
This kind of a Trojan is used most frequently to form a botnet or a zombie network of the infected
computers by uniting those, so that those can be used for criminal activities.
9
 Rootkit
This kind of a Trojan is meant to conceal certain objects or activities in the user’s system. Usually its
main aim is to ensure that malicious programs do not get detected. This is required to extend the
duration for which such programs can run on an infected computer.
 Exploit
It is a kind of a program that contains data or code which is used to take advantage of a
vulnerability that is within the application software which is running on the target’s computer.
 Trojan-DDoS
These programs are designed to conduct DoS (Denial of Service) attacks on a target web address. These
overwhelm the target web address by sending multiple requests from the user’s computer and several other
infected computers. This leads to a Denial of Service.
More Types of Trojan Horses
10
 Trojan-Banker
A program of this type is used for the purpose of stealing the account data related to online banking
systems, e-payment systems and credit or debit cards of the target user, whose system is infected by it.
 Trojan-Downloader
It can download and then install new versions of Trojans and adware as well as other malicious malware
onto its target’s computer. The malware that already exists in the user’s system can be easily upgraded by
it.
 Trojan-Dropper
It is a type of Trojan that is used for the purpose of installing Trojans and or viruses. It is used to prevent the
detection of malicious programs as well. Every antivirus program is not capable of scanning all of the
components that are in this Trojan.
 Trojan-Game Thief
It is used to steal a user’s account information from online games.
Some More Types of Trojan Horses
11
 Trojan-Fake AV
This type of a Trojan simulates the activity of an antivirus software. It is designed to extract money from the user by
giving him false information regarding the detection and removal of a cyber threat. It reports threats that do not even
exist on the user’s system.
 Trojan-IM
Trojan-IM programs are meant to steal the logins and passwords from instant messaging programs, such as Skype, MSN
Messenger, ICQ and many more.
Trojan-Ransom
This type of a Trojan is designed to modify the data on the target’s computer. This is aimed at ensuring that the target’s
computer doesn’t run correctly or is not able to use specific data any more. In this case the cybercriminal will only restore the
target computer’s performance or unblock its data, after he receives the ransom that he had demanded.
Trojan-SMS
These can cost the user money. These act by sending text messages from the target’s mobile device to premium rate phone
numbers.
12
1-800-123 -8156
Whoa! That’s a big number, aren’t you proud?
More Types of Trojan Horses
 Trojan-Mailfinder
These are meant to harvest email addresses from the target’s system.
 Trojan-Spy
It is designed to spy on the target’s usage of his own system. It can track the data that is entered using the keyboard, take
screenshots as well as collect a list of the applications that are running on the system.
Conclusion
With the increase in the use of Internet, the numerous threats posed by malware are
looming large. Hence, every user of the Internet needs to be aware of the danger as
well as the damage that a malware like Trojan Horse can cause to a user’s system and
network. Every precaution must be taken to ensure proper security against malware
like Trojan Horses, if one wants to avoid any mishap and use the Internet safely and
fruitfully.
15
Thanks!
ANY QUESTIONS?
You can find me at:
www.htshosting.org
www.htshosting.org/best-web-hosting-company-India
www.htshosting.org/best-windows-hosting
www.htshosting.org/best-cloud-hosting-company
support@htshosting.org

More Related Content

What's hot

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
missstevenson01
 
Security threats
Security threatsSecurity threats
Security threats
Integral university, India
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
IT Department Akre
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacksariifuddin
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
jibinmanjooran
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
Shrey Vyas
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
INFONAUTICS GmbH
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Malware, Trojans and Slurpware
Malware, Trojans and  SlurpwareMalware, Trojans and  Slurpware
Malware, Trojans and Slurpware
Varun Arora
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
Arpit Mittal
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 

What's hot (19)

MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Security threats
Security threatsSecurity threats
Security threats
 
Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking Trojan Horse Virus and Hacking
Trojan Horse Virus and Hacking
 
Presentation
PresentationPresentation
Presentation
 
Virus-trojan and salami attacks
Virus-trojan and salami attacksVirus-trojan and salami attacks
Virus-trojan and salami attacks
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malware, Trojans and Slurpware
Malware, Trojans and  SlurpwareMalware, Trojans and  Slurpware
Malware, Trojans and Slurpware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 

Similar to The trojan horse virus

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
EC-Council
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
Atuk4
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
HanhSajiDozonArre
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
jyoti_lakhani
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Information security
Information securityInformation security
Information security
JAMEEL AHMED KHOSO
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
Apurv Singh Gautam
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
SarahReese14
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
ajajkhan16
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 

Similar to The trojan horse virus (20)

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Computer virus
Computer virusComputer virus
Computer virus
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Security threats
Security threatsSecurity threats
Security threats
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
MALWARE
MALWAREMALWARE
MALWARE
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
HTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
HTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
HTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
HTS Hosting
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
HTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
HTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
HTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
HTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
HTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
HTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
HTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
HTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
HTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
HTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
HTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

The trojan horse virus

  • 2. Table of Contents 2  Websites and Web Hosting Service Providers  Malware  Trojan Horse  Trojan’s Actions  Common Characteristic of all Trojans  Types of Trojan Horses  More Types of Trojan Horses  Some More Types of Trojan Horses  More Types of Trojan Horses  Conclusion
  • 3.  Each are every website that we visit is hosted on the web server of a web hosting company. These web hosting companies, which are also called web hosts, are responsible for leasing server space to website owners along with providing them the services and the technologies that are needed by a website in order to be accessible.  When one refers to a “Windows Hosting Company” or to a “Cloud Hosting Company” or even to the “best Web Hosting Company” in India or even abroad, one is essentially referring to web hosting service providers. 3 Websites and Web Hosting Service Providers
  • 4. YELLOW  It refers to any malicious program that has been designed and installed onto a system with the intention of harming either the computer, computer network, the server or the user of these. Computer programs that act covertly to cause damage to data also fall in this category. It is made up of code that is developed by cybercriminals and its aim is to cause substantial damage to the data as well as the system that it targets. Its other aim is to have unauthorized access to a network. Any malware is usually delivered in the form of a file or a link that is sent over email. It requires the user to click on it, so that the malware can be executed.  A huge range of malware types exist. These can be computer viruses, Trojan Horses, worms, spyware, rogue software, ransomware, adware, wiper and scareware.  This PPT is aimed at shedding light upon the malware Trojan Horse in particular. Malware 4
  • 5. Trojan Horse  A Trojan Horse or a Trojan is a kind of a malware that is often found in the guise of a legitimate software. These are used by cybercriminals to gain access to a particular system. One of its important characteristics is, it remains in the users’ systems covertly and does not let them find it.  The targeted user is tricked into loading and eventually triggering the execution of Trojans on their device. This is achieved by employing some sort of social engineering mechanism. Once these Trojans have been installed on the user’s system these facilitate gaining backdoor access to it for spying on the user, stealing his/her sensitive data along with personal information. These are capable of deleting the files of a user that are on that system as well as infecting other devices which are connected to that network.  Trojans are not able to self-replicate which sets these apart from computer viruses and worms. 5
  • 6. Trojan’s Actions 6 Once Trojans are activated these can fulfil the following purposes-  Copying data  Deleting data  Modifying data  Blocking data  Hampering the performance of computers or computer networks
  • 7. Common Characteristic of all Trojans 7 Four of the most common characteristics of every type of Trojan are mentioned below-  Fraudulent  Remains concealed  Capable of opening terminal automatically by using the communication means of client-server model  Can self-repair
  • 8. Types of Trojan Horses 8 Trojans are of the following types, which are mentioned in no particular order-  Backdoor This kind of a Trojan enables remote control over the targeted system by its sender, who has a malicious purpose. The cybercriminal accesses the legitimate user’s system without him being aware of it. Once a Backdoor Trojan is installed, it gives total power to the author to do everything that he/she wishes to do on the infected device. This enables him to do everything that the actual user can do on his system. These activities include but are not limited to reading data, sending files, receiving, launching and deleting files along with displaying data and rebooting the computer. This kind of a Trojan is used most frequently to form a botnet or a zombie network of the infected computers by uniting those, so that those can be used for criminal activities.
  • 9. 9  Rootkit This kind of a Trojan is meant to conceal certain objects or activities in the user’s system. Usually its main aim is to ensure that malicious programs do not get detected. This is required to extend the duration for which such programs can run on an infected computer.  Exploit It is a kind of a program that contains data or code which is used to take advantage of a vulnerability that is within the application software which is running on the target’s computer.  Trojan-DDoS These programs are designed to conduct DoS (Denial of Service) attacks on a target web address. These overwhelm the target web address by sending multiple requests from the user’s computer and several other infected computers. This leads to a Denial of Service.
  • 10. More Types of Trojan Horses 10  Trojan-Banker A program of this type is used for the purpose of stealing the account data related to online banking systems, e-payment systems and credit or debit cards of the target user, whose system is infected by it.  Trojan-Downloader It can download and then install new versions of Trojans and adware as well as other malicious malware onto its target’s computer. The malware that already exists in the user’s system can be easily upgraded by it.  Trojan-Dropper It is a type of Trojan that is used for the purpose of installing Trojans and or viruses. It is used to prevent the detection of malicious programs as well. Every antivirus program is not capable of scanning all of the components that are in this Trojan.  Trojan-Game Thief It is used to steal a user’s account information from online games.
  • 11. Some More Types of Trojan Horses 11  Trojan-Fake AV This type of a Trojan simulates the activity of an antivirus software. It is designed to extract money from the user by giving him false information regarding the detection and removal of a cyber threat. It reports threats that do not even exist on the user’s system.  Trojan-IM Trojan-IM programs are meant to steal the logins and passwords from instant messaging programs, such as Skype, MSN Messenger, ICQ and many more. Trojan-Ransom This type of a Trojan is designed to modify the data on the target’s computer. This is aimed at ensuring that the target’s computer doesn’t run correctly or is not able to use specific data any more. In this case the cybercriminal will only restore the target computer’s performance or unblock its data, after he receives the ransom that he had demanded. Trojan-SMS These can cost the user money. These act by sending text messages from the target’s mobile device to premium rate phone numbers.
  • 12. 12 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?
  • 13. More Types of Trojan Horses  Trojan-Mailfinder These are meant to harvest email addresses from the target’s system.  Trojan-Spy It is designed to spy on the target’s usage of his own system. It can track the data that is entered using the keyboard, take screenshots as well as collect a list of the applications that are running on the system.
  • 14. Conclusion With the increase in the use of Internet, the numerous threats posed by malware are looming large. Hence, every user of the Internet needs to be aware of the danger as well as the damage that a malware like Trojan Horse can cause to a user’s system and network. Every precaution must be taken to ensure proper security against malware like Trojan Horses, if one wants to avoid any mishap and use the Internet safely and fruitfully.
  • 15. 15 Thanks! ANY QUESTIONS? You can find me at: www.htshosting.org www.htshosting.org/best-web-hosting-company-India www.htshosting.org/best-windows-hosting www.htshosting.org/best-cloud-hosting-company support@htshosting.org