SlideShare a Scribd company logo
1 of 3
Running head: MALWARE
1
MALWARE
2
Student’s name:
Professor' name:
Topic:
Institution:
Date:
Malware-Trojan horse virus
Malware can be defined as any file or program that is
introduced to a computer with the intention of harming the user.
The harm to the user can be through interfering with his use of
the compute, unauthorized access to his data, locking the user
out of his computer and also spying on the user’s activity. There
are several types of malware and they include ransom ware,
Trojan horses, computer viruses, worms and spyware (White,
Fisch & Pooch, 2017). For this particular assignment, I will
focus on Trojan horse virus. The name Trojan horse comes from
the famous Greek story, where Greek soldiers were able to take
down the city of Troy after they sneaked into the city inside a
wooden horse that was guised as a gift to the people of Troy.
Just like the story the Trojan horse virus disguises itself as a
legitimate program however the program provides unauthorized
access into the system most of the time to hackers.
Most of the time, Trojan horses gain access to a secured system
through social engineering. Most of the time, Trojan horse
viruses are introduced into a system by duping a user into
executing an attachment on an email guised to be unsuspicious.
They can also be introduced via social media where users are
tricked into clicking on fake advertisements or advertisements
that offer fake rewards. Once the links or attachments are
clicked on, a Trojan horse virus is introduced. Trojan horse
viruses can allow an attacker to have access to a user’s personal
information and other forms of data. Trojan horse viruses can
affect other devices on the network through infection caused by
the introduction of the first Trojan horse; most ransom ware is
introduced through Trojan horse viruses (Wang, Lorch & Parno,
2016). In addition, through the use of Trojan horse viruses,
attackers can modify data, copy data, block data, delete data and
generally disrupt or distort the performance and operations of
targeted computers or devices in a network.
Steps of mitigating a Trojan horse virus attack
The first step in mitigating a Trojan horse virus attack is the
installation of effective anti-malware software or what is
commonly referred to as an anti-virus. The anti-malware will
detect as well as prevent any Trojan horse virus attack on a
computer or a network. The second step in mitigating Trojan
horse virus attacks is the installation of the latest available
patches of the operating system in use. The third step is proper
scanning of all external devices that are introduced to a
computer or a network (Rader & Rahman, 2015). The fourth
step is through the cautioning on the execution of any program
that is not from a trusted source. The fifth step is the cautioning
on the opening of email attachments from unknown senders
especially attachments that have the extensions .vbs and .exe.
The final step or caution is to be alert on social media adverts
especially those that offer rewards through clicking on links.
References
Rader, M., & Rahman, S. (2015). Exploring historical and
emerging phishing techniques and mitigating the associated
security risks. arXiv preprint arXiv:1512.00082.
Wang, J. H., Lorch, J. R., & Parno, B. J. (2016). U.S. Patent
No. 9,230,100. Washington, DC: U.S. Patent and Trademark
Office.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer
system and network security. CRC press.

More Related Content

Similar to Running head MALWARE .docx

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 

Similar to Running head MALWARE .docx (20)

Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Information security
Information securityInformation security
Information security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Presentation1
Presentation1Presentation1
Presentation1
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
TROJAN HORSE.pptx
TROJAN HORSE.pptxTROJAN HORSE.pptx
TROJAN HORSE.pptx
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Case study
Case studyCase study
Case study
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 

More from wlynn1

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docxwlynn1
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxwlynn1
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxwlynn1
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxwlynn1
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docxwlynn1
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxwlynn1
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxwlynn1
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxwlynn1
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docxwlynn1
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docxwlynn1
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docxwlynn1
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxwlynn1
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxwlynn1
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxwlynn1
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxwlynn1
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxwlynn1
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxwlynn1
 
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxRunning Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxwlynn1
 

More from wlynn1 (20)

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docx
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docx
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
 
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxRunning Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Running head MALWARE .docx

  • 1. Running head: MALWARE 1 MALWARE 2 Student’s name: Professor' name: Topic: Institution: Date: Malware-Trojan horse virus Malware can be defined as any file or program that is introduced to a computer with the intention of harming the user. The harm to the user can be through interfering with his use of the compute, unauthorized access to his data, locking the user out of his computer and also spying on the user’s activity. There are several types of malware and they include ransom ware, Trojan horses, computer viruses, worms and spyware (White, Fisch & Pooch, 2017). For this particular assignment, I will focus on Trojan horse virus. The name Trojan horse comes from the famous Greek story, where Greek soldiers were able to take
  • 2. down the city of Troy after they sneaked into the city inside a wooden horse that was guised as a gift to the people of Troy. Just like the story the Trojan horse virus disguises itself as a legitimate program however the program provides unauthorized access into the system most of the time to hackers. Most of the time, Trojan horses gain access to a secured system through social engineering. Most of the time, Trojan horse viruses are introduced into a system by duping a user into executing an attachment on an email guised to be unsuspicious. They can also be introduced via social media where users are tricked into clicking on fake advertisements or advertisements that offer fake rewards. Once the links or attachments are clicked on, a Trojan horse virus is introduced. Trojan horse viruses can allow an attacker to have access to a user’s personal information and other forms of data. Trojan horse viruses can affect other devices on the network through infection caused by the introduction of the first Trojan horse; most ransom ware is introduced through Trojan horse viruses (Wang, Lorch & Parno, 2016). In addition, through the use of Trojan horse viruses, attackers can modify data, copy data, block data, delete data and generally disrupt or distort the performance and operations of targeted computers or devices in a network. Steps of mitigating a Trojan horse virus attack The first step in mitigating a Trojan horse virus attack is the installation of effective anti-malware software or what is commonly referred to as an anti-virus. The anti-malware will detect as well as prevent any Trojan horse virus attack on a computer or a network. The second step in mitigating Trojan horse virus attacks is the installation of the latest available patches of the operating system in use. The third step is proper scanning of all external devices that are introduced to a computer or a network (Rader & Rahman, 2015). The fourth step is through the cautioning on the execution of any program that is not from a trusted source. The fifth step is the cautioning on the opening of email attachments from unknown senders especially attachments that have the extensions .vbs and .exe.
  • 3. The final step or caution is to be alert on social media adverts especially those that offer rewards through clicking on links. References Rader, M., & Rahman, S. (2015). Exploring historical and emerging phishing techniques and mitigating the associated security risks. arXiv preprint arXiv:1512.00082. Wang, J. H., Lorch, J. R., & Parno, B. J. (2016). U.S. Patent No. 9,230,100. Washington, DC: U.S. Patent and Trademark Office. White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.