Trojan Horse Program Presented by : Lori Agrawal.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Threats To A Computer Network
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Trojan Horse Chris Wise & Jacob Summers. Overview What is Trojan Horse? Types of Trojan Horses? How can you be infected? What do attackers want?
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Computer Viruses.
TROJAN HORSE ATTACKS By MOHD HAZRIL B.MOHD RAZALI IBNU KHALDUN.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Types of Electronic Infection
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance Lesson 3.
Computer Skills and Applications Computer Security.
Your Interactive Guide to the Digital World Discovering Computers 2012.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance Lesson 3.
Discovering Computers 2012: Chapter 8
Backdoor Attacks.
SEMINAR ON PC SECURITY FROM VIRUSES
Remote Control and Advanced Techniques
Bomgar Remote support software
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Outline Overview Development Tools
Presentation transcript:

Trojan Horse Program Presented by : Lori Agrawal

Agenda n What is Trojan Horse program? n Who are the targets? n How it gets spread? n Impact of Trojan Horse Attack n Control of hackers over files n Ways to avoid this attack

Continue: n Detection of attack n How to remove Trojan from system n Example: SubSeven n Capabilities of SubSeven Program n Parts of SubSeven n A real Trojan Horse Threat n Conclusion

What is Trojan Horse Program? n Trojan Horse is one of the today’s most serious threat to computer security. n A malicious security-breaking program disguised as something benign. n A executable program n Once infected, it is controlled totally by a hacker.

Who are the most targets? n The home computers n Reasons u Private Content u Availability u Defendless status

How it gets spread? n attachments n Sending files in chat rooms n Infected computer can attack other computer

Impact of Trojan Horse Attack n Complete access to victim’s system n Delete and alter files n Access to Administrator privileges n Other computer get infected n An infected computer can be targeted by any user.

Control of hackers over files n Alter user’s private documents such as bank statement, credit card statement, password file, mortgage payments files. n Access files remotely as they own it n Access of chat history

Ways to avoid this attack n Don’t download from unknown source n Need to be aware of hidden extension n Don’t use automatically get file feature n Don’t type a command or go to web site told by a stranger n Remove unnecessary services and file shares

Detection of attack n Hard to detect whether a computer is infected or not n Not listed under process list of ALT+Ctrl+Delete key n To detect, one can scan his computer for open port

How to remove Trojan from system n By getting clean re-installation n Anti-Trojan Software

Example: SubSeven n Trojan Horse program that attacks computer running on Window 9.x platform. n More popular than other types as it provides more options.

What SubSeven can do? n It can restarts Windows of Victim’s computer. n It can record sound files from microphone used on victim’s machine. n It can record video images from a video camera attached to the victim’s computer. n It can change desktop color, wallpaper and turn on and off the victim’s monitor. n It can open and close CD-ROM drive. n It can capture screen shots of user’s currently activity. n A new version of SubSeven also allow hackers to know whether a victim is presently online, a manager feature that can abort a program running on victim’s machine.

Part of SubSeven: n SubSeven Server: Must run on victim’s computer. n Client Program: Used by hacker on his machine to connect to server(Victim’s computer). n Server Editor: An interface to Hacker to choose option how to get information from victim’s computer.

A real Trojan Horse Threat n Targets were customer of Paypal’s online service n Spread using sending s containing subject line “PAYPAL.COM NEW YEAR OFFER” n s contained information about payment discount n Create a fake Paypal web site and ask for credit card info.

Conclusion n Serious network security problem n Once infected, computer is totally controlled by hacker. n Hard to detect whether a computer is infected or not. n Hard to recover.

Any Questions?