1. SREENIDHI INSTITUTE OF
SCIENCE AND TECHNOLOGY
TROJAN HORSE
By,
S.Vinay
Computer Science and
Engineering
Department
14311A0557
2. TABLE OF CONTENTS:
INTRODUCTION
ETHYMOLOGY
TYPES OF TROJANS
HOW TROJAN WORKS
PURPOSE OF TROJAN
NOTABLE TROJANS
PREVENTION
REFERENCES
3. INTRODUCTION:
•A destuctive program that installs malicious
softwares in the guise of doing something
else.
•Trojans are different from virus.
•Malicious programs are classified as Trojans if
they do not attempt to inject themselves into
other files or otherwise propagate themselves
4. •A computer may host a Trojan via a malicious
program that a user is duped into executing.
5. ETHYMOLOGY
•The term comes from the a Greek story of the
Trojan War,in which the Greeks hide in the
wooden horse inorder to breach the walls of
Troy.
6. HOW TROJANS WORK:
•A program with Trojan appears to be
legitimate to the user,but as user interacts with
it ,it begins doing various unnecessary actions
•Now the Trojan creates a safe passage for the
attacker to the user and makes the users
computer vulnerable.
•Trojan horses do not replicate themselves but
they can be just as destructive as viruses are.
7. TYPES OF TROJANS:
Trojan horses are broken down in classification based on
how they breach systems and the damage they cause.
The seven main types of Trojan horses are:
•Remote Access Trojans
•Data Sending Trojans
•Destructive Trojans
•Proxy Trojans
•FTP Trojans
•security software disabler Trojans
•denial-of-service attack (DoS) Trojans
8. PURPOSE OF TROJANS:
•Crashing the computer
•Data corruption
•Formatting disks, destroying all contents
•Electronic money theft
•Modification or deletion of files
•Watching the user's screen
•Using the infected computer as proxy for
illeagal activities.
9. NOTABLE TROJANS:
•Netbus Advance System
•Subseven or Sub7
•Back Orifice
•Beast
•Zeus
•Flashback Trojan
•ZeroAccess
•Koobface
•Vundo
10. PREVENTION:
•Avoid opening unsolicited email from unknown
senders.
•Avoid downloading and installing programs unless
the publisher is trusted.
•Use firewall to block all unsolicited connections.
•Use fully updated anti virus program whenever you
are using the internet.