SlideShare a Scribd company logo
1 of 3
Running head: MALWARE
1
MALWARE
2
Student’s name:
Professor' name:
Topic:
Institution:
Date:
Malware-Trojan horse virus
Malware can be defined as any file or program that is
introduced to a computer with the intention of harming the user.
The harm to the user can be through interfering with his use of
the compute, unauthorized access to his data, locking the user
out of his computer and also spying on the user’s activity. There
are several types of malware and they include ransom ware,
Trojan horses, computer viruses, worms and spyware (White,
Fisch & Pooch, 2017). For this particular assignment, I will
focus on Trojan horse virus. The name Trojan horse comes from
the famous Greek story, where Greek soldiers were able to take
down the city of Troy after they sneaked into the city inside a
wooden horse that was guised as a gift to the people of Troy.
Just like the story the Trojan horse virus disguises itself as a
legitimate program however the program provides unauthorized
access into the system most of the time to hackers.
Most of the time, Trojan horses gain access to a secured system
through social engineering. Most of the time, Trojan horse
viruses are introduced into a system by duping a user into
executing an attachment on an email guised to be unsuspicious.
They can also be introduced via social media where users are
tricked into clicking on fake advertisements or advertisements
that offer fake rewards. Once the links or attachments are
clicked on, a Trojan horse virus is introduced. Trojan horse
viruses can allow an attacker to have access to a user’s personal
information and other forms of data. Trojan horse viruses can
affect other devices on the network through infection caused by
the introduction of the first Trojan horse; most ransom ware is
introduced through Trojan horse viruses (Wang, Lorch & Parno,
2016). In addition, through the use of Trojan horse viruses,
attackers can modify data, copy data, block data, delete data and
generally disrupt or distort the performance and operations of
targeted computers or devices in a network.
Steps of mitigating a Trojan horse virus attack
The first step in mitigating a Trojan horse virus attack is the
installation of effective anti-malware software or what is
commonly referred to as an anti-virus. The anti-malware will
detect as well as prevent any Trojan horse virus attack on a
computer or a network. The second step in mitigating Trojan
horse virus attacks is the installation of the latest available
patches of the operating system in use. The third step is proper
scanning of all external devices that are introduced to a
computer or a network (Rader & Rahman, 2015). The fourth
step is through the cautioning on the execution of any program
that is not from a trusted source. The fifth step is the cautioning
on the opening of email attachments from unknown senders
especially attachments that have the extensions .vbs and .exe.
The final step or caution is to be alert on social media adverts
especially those that offer rewards through clicking on links.
References
Rader, M., & Rahman, S. (2015). Exploring historical and
emerging phishing techniques and mitigating the associated
security risks. arXiv preprint arXiv:1512.00082.
Wang, J. H., Lorch, J. R., & Parno, B. J. (2016). U.S. Patent
No. 9,230,100. Washington, DC: U.S. Patent and Trademark
Office.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer
system and network security. CRC press.

More Related Content

Similar to Running head MALWARE .docx

virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIROTakagi Kun
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 

Similar to Running head MALWARE .docx (20)

virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Information security
Information securityInformation security
Information security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Presentation1
Presentation1Presentation1
Presentation1
 
VIRUS BY CHIRO
VIRUS BY CHIROVIRUS BY CHIRO
VIRUS BY CHIRO
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
TROJAN HORSE.pptx
TROJAN HORSE.pptxTROJAN HORSE.pptx
TROJAN HORSE.pptx
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Trojan Virus.pptx
Trojan Virus.pptxTrojan Virus.pptx
Trojan Virus.pptx
 
Case study
Case studyCase study
Case study
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 

More from wlynn1

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docxwlynn1
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxwlynn1
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxwlynn1
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxwlynn1
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docxwlynn1
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxwlynn1
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxwlynn1
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxwlynn1
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docxwlynn1
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docxwlynn1
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docxwlynn1
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxwlynn1
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxwlynn1
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxwlynn1
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxwlynn1
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxwlynn1
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxwlynn1
 
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxRunning Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxwlynn1
 

More from wlynn1 (20)

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docx
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docx
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
 
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docxRunning Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
Running Head LITERATURE REVIEW1LITERATURE REVIEW6.docx
 

Recently uploaded

An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdfKamal Acharya
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...Krashi Coaching
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxMohamed Rizk Khodair
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIagpharmacy11
 

Recently uploaded (20)

An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 

Running head MALWARE .docx

  • 1. Running head: MALWARE 1 MALWARE 2 Student’s name: Professor' name: Topic: Institution: Date: Malware-Trojan horse virus Malware can be defined as any file or program that is introduced to a computer with the intention of harming the user. The harm to the user can be through interfering with his use of the compute, unauthorized access to his data, locking the user out of his computer and also spying on the user’s activity. There are several types of malware and they include ransom ware, Trojan horses, computer viruses, worms and spyware (White, Fisch & Pooch, 2017). For this particular assignment, I will focus on Trojan horse virus. The name Trojan horse comes from the famous Greek story, where Greek soldiers were able to take
  • 2. down the city of Troy after they sneaked into the city inside a wooden horse that was guised as a gift to the people of Troy. Just like the story the Trojan horse virus disguises itself as a legitimate program however the program provides unauthorized access into the system most of the time to hackers. Most of the time, Trojan horses gain access to a secured system through social engineering. Most of the time, Trojan horse viruses are introduced into a system by duping a user into executing an attachment on an email guised to be unsuspicious. They can also be introduced via social media where users are tricked into clicking on fake advertisements or advertisements that offer fake rewards. Once the links or attachments are clicked on, a Trojan horse virus is introduced. Trojan horse viruses can allow an attacker to have access to a user’s personal information and other forms of data. Trojan horse viruses can affect other devices on the network through infection caused by the introduction of the first Trojan horse; most ransom ware is introduced through Trojan horse viruses (Wang, Lorch & Parno, 2016). In addition, through the use of Trojan horse viruses, attackers can modify data, copy data, block data, delete data and generally disrupt or distort the performance and operations of targeted computers or devices in a network. Steps of mitigating a Trojan horse virus attack The first step in mitigating a Trojan horse virus attack is the installation of effective anti-malware software or what is commonly referred to as an anti-virus. The anti-malware will detect as well as prevent any Trojan horse virus attack on a computer or a network. The second step in mitigating Trojan horse virus attacks is the installation of the latest available patches of the operating system in use. The third step is proper scanning of all external devices that are introduced to a computer or a network (Rader & Rahman, 2015). The fourth step is through the cautioning on the execution of any program that is not from a trusted source. The fifth step is the cautioning on the opening of email attachments from unknown senders especially attachments that have the extensions .vbs and .exe.
  • 3. The final step or caution is to be alert on social media adverts especially those that offer rewards through clicking on links. References Rader, M., & Rahman, S. (2015). Exploring historical and emerging phishing techniques and mitigating the associated security risks. arXiv preprint arXiv:1512.00082. Wang, J. H., Lorch, J. R., & Parno, B. J. (2016). U.S. Patent No. 9,230,100. Washington, DC: U.S. Patent and Trademark Office. White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.