SlideShare a Scribd company logo
Sheen Hunter presents:
THE COMPUTER & INTERNET
   SECURITY PROJECT




                threat:
              Trojan horse
The attack!

 Crackers -- hackers who use their computer
 skills to create mischief or cause malicious
 threats intentionally -- can send out Trojans
 that turn innocent Human’s computer
 into zombie computers, so-called because the
 human with the infected computer rarely
 knows his/her system is under control. Crackers
 then use these zombie computers to send out
What does it mean?!
Is it Good or Bad?
 n. A subversive group or device placed
  within enemy ranks.
 The hollow wooden horse in which,
  according to legend, Greeks hid and
  gained entrance to Troy, later opening
  the gates to their army.
 Computer Science. A program that
  appears to be legitimate but is designed
  to have destructive effects, as to data
  residing in the computer onto which the
So… it’S baSically a Spy!!
 A Trojan is technically a worm.
 The threat is hidden/disguised in software that
  appears to be useful. (such as virus removal
  program)
 Can access files, folders, or your entire systems
  by creating a "backdoor" or a “trapdoor "which
  can be used to send your personal information
  to another location.
 The program can reproduce LIKE a virus and
  spread to other computers. A virus replicates
  itself, while a Trojan horse does not.
 It can damage, delete, or destroy important
  files.
How to PROTECT yourself?

•#1 Beware of opening any e-mails or
downloading attachments.                       Trusted Antivirus
•Delete e-mail that seems suspicious.          software suites:
•Install an antivirus software and firewall.   Avast Antivirus
•Scan every file you download (even if it's    AVG Anti-Virus
from someone you know)                         Kaspersky Anti-
•Have a Trojan? Disconnect your Internet       Virus
connection and remove the files in question    McAfee
with an antivirus program or by reinstalling   VirusScan
your operating system.                         Norton AntiVirus
•Call your computer manufacturer if you
need extra assistance.
What’S the troubleShooting proceSS?
What’S the troubleShooting proceSS?
What’S the troubleShooting proceSS?
What’S the troubleShooting proceSS?




           4!Implement
            a Solution
What’S the troubleShooting proceSS?



             5!Verify
           Solution and
           Full System
           Functionality
What’S the troubleShooting proceSS?




           6!Document
             Findings
More info: http://technet.microsoft.com/en-us/library/dd632947.aspx




http://technet.microsoft.com/en-
us/library/dd632947.aspx

More Related Content

What's hot

Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
Arjunsinh Sindhav
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
securityxploded
 
Virus
VirusVirus
Virus
CHITRA S
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoorsmridulahuja
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
sitinursyafiqah
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)Angel Sophie
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
ShouaQureshi
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Aakash Baloch
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
Abdelhamid Limami
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
n|u - The Open Security Community
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Muzaffar Ahmad
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 

What's hot (20)

Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Virus
VirusVirus
Virus
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Internet security
Internet securityInternet security
Internet security
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Web backdoors attacks, evasion, detection
Web backdoors   attacks, evasion, detectionWeb backdoors   attacks, evasion, detection
Web backdoors attacks, evasion, detection
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 

Viewers also liked

WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
Epic Research Limited
 
2200 capítulo 12 clase 05
2200 capítulo 12 clase 052200 capítulo 12 clase 05
2200 capítulo 12 clase 05uanzigba
 
Mobile Learning Final Project
Mobile Learning Final ProjectMobile Learning Final Project
Mobile Learning Final Projectzombie23esu
 
Presentación la valiente
Presentación la valientePresentación la valiente
Presentación la valiente
Osrojano
 
Calpine2Q08_Earnings_Presentation_vFINAL
Calpine2Q08_Earnings_Presentation_vFINALCalpine2Q08_Earnings_Presentation_vFINAL
Calpine2Q08_Earnings_Presentation_vFINALfinance29
 
Vassy Erzsébet pasztellfestményei
Vassy Erzsébet pasztellfestményeiVassy Erzsébet pasztellfestményei
Vassy Erzsébet pasztellfestményei
Kapitán József
 

Viewers also liked (6)

WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
WEEKLY COMMODITY REPORT BY EPIC RESEARCH-24 DECEMBER 2012
 
2200 capítulo 12 clase 05
2200 capítulo 12 clase 052200 capítulo 12 clase 05
2200 capítulo 12 clase 05
 
Mobile Learning Final Project
Mobile Learning Final ProjectMobile Learning Final Project
Mobile Learning Final Project
 
Presentación la valiente
Presentación la valientePresentación la valiente
Presentación la valiente
 
Calpine2Q08_Earnings_Presentation_vFINAL
Calpine2Q08_Earnings_Presentation_vFINALCalpine2Q08_Earnings_Presentation_vFINAL
Calpine2Q08_Earnings_Presentation_vFINAL
 
Vassy Erzsébet pasztellfestményei
Vassy Erzsébet pasztellfestményeiVassy Erzsébet pasztellfestményei
Vassy Erzsébet pasztellfestményei
 

Similar to Trojan horsies prez

Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
shubhamverma2711
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
amyray28
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
JauwadSyed
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
Saud G
 
Malicious
MaliciousMalicious
Malicious
Khyati Rajput
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
Alfred George
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
Nishant Reshwal
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Malicious software
Malicious softwareMalicious software
Malicious software
Dr.Florence Dayana
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Rabab Munawar
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 

Similar to Trojan horsies prez (20)

Computer virus & its cure
Computer virus & its cure Computer virus & its cure
Computer virus & its cure
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Malicious
MaliciousMalicious
Malicious
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
anti_virus
anti_virusanti_virus
anti_virus
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
virus
virusvirus
virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Malware
MalwareMalware
Malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Trojan horsies prez

  • 1. Sheen Hunter presents: THE COMPUTER & INTERNET SECURITY PROJECT threat: Trojan horse
  • 2.
  • 3. The attack! Crackers -- hackers who use their computer skills to create mischief or cause malicious threats intentionally -- can send out Trojans that turn innocent Human’s computer into zombie computers, so-called because the human with the infected computer rarely knows his/her system is under control. Crackers then use these zombie computers to send out
  • 4. What does it mean?! Is it Good or Bad?  n. A subversive group or device placed within enemy ranks.  The hollow wooden horse in which, according to legend, Greeks hid and gained entrance to Troy, later opening the gates to their army.  Computer Science. A program that appears to be legitimate but is designed to have destructive effects, as to data residing in the computer onto which the
  • 5.
  • 6. So… it’S baSically a Spy!!  A Trojan is technically a worm.  The threat is hidden/disguised in software that appears to be useful. (such as virus removal program)  Can access files, folders, or your entire systems by creating a "backdoor" or a “trapdoor "which can be used to send your personal information to another location.  The program can reproduce LIKE a virus and spread to other computers. A virus replicates itself, while a Trojan horse does not.  It can damage, delete, or destroy important files.
  • 7. How to PROTECT yourself? •#1 Beware of opening any e-mails or downloading attachments. Trusted Antivirus •Delete e-mail that seems suspicious. software suites: •Install an antivirus software and firewall. Avast Antivirus •Scan every file you download (even if it's AVG Anti-Virus from someone you know) Kaspersky Anti- •Have a Trojan? Disconnect your Internet Virus connection and remove the files in question McAfee with an antivirus program or by reinstalling VirusScan your operating system. Norton AntiVirus •Call your computer manufacturer if you need extra assistance.
  • 11. What’S the troubleShooting proceSS? 4!Implement a Solution
  • 12. What’S the troubleShooting proceSS? 5!Verify Solution and Full System Functionality
  • 13. What’S the troubleShooting proceSS? 6!Document Findings