What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Chapter Nine Maintaining a Computer Part III: Malware.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
 a crime committed on a computer network, esp. the Internet.
Computer Viruses.
Introduction of Internet security Sui Wang IS300.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Understand Malware LESSON Security Fundamentals.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer History By Jordan Mendez. Important Events 1936-The first computer is made 1962-The first computer game, Space Wars, is invented The original.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Chapter 40 Internet Security.
An Introduction to Phishing and Viruses
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Applications Unit B
Forensics Week 12.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. 1

What are Trojan horses?  A Trojan Horse is an virus usually released by an attachment. A Trojan is a program that appears to be legitimate, but in fact does something malicious. Quite often, that something malicious involves gaining remote, surreptitious access to a user's system. Unlike viruses, a Trojan does not replicate itself as worms do. 2

How do Trojan horses work?  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. 1

How do Trojan horses work?  Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. 2

How can it damage your computer?  Unlike viruses, Trojan horses do not replicate themselves, but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to get rid of viruses but instead introduces viruses onto the computer. 1

How can it damage your computer?  It looks like it might be harmless and useful but it will have a hidden code that can create great damage in your computer or install some spyware. The Trojan horse viruses infect PCs by being spread by other mechanisms, meaning that computer Trojans cannot materialize on their own. 2

How does it get on your computer?  Trojan may allow a hacker remote access to a target computer system. Once a Trojan has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan. 1

How does it get on your computer?  Some Trojan horses are spyware and are used to track activity on your computer and then send this information to other parties without your consent or knowledge. One of the most common ways that the Trojan horse virus can be spread is via , as the attacker will send victims s with an attachment and once the victim opens the attachment the Trojan viruses are then able to infect their system. 2

How to avoid it  One way to avoid it is to back up all of your data and do a clean restore of your computer. If you've had unknown problems with remote access Trojans or surf the Internet without proper anti-virus software, doing this will give you a clean slate to start from and eradicate any malicious programs that may have been hiding in the background.  Never open any Unsolicited s even those sent by a friend. Any link on an could potentially house malware.  Never download or install any programs on to your computer unless you completely trust the publisher there are more than a few of them hiding Trojan horses. 1

How to avoid it  You can also install both anti-virus and anti-spyware software before browsing the Internet. Your Internet service provider may offer you free software and updates. Many companies also offer "lite" versions of their anti-virus programs that are not as thorough as the full versions but are much better than having no safeguard at all.  Have a firewall on your computer. This can help stop unsolicited connections to your computer which could stop the action of a Trojan Horse.  Run an up to date version of Anti-virus on your computer. These can scan any program for malicious programs such as Trojan Horses or others. 2

Vocab.  Trojan Horse(Greek Mythology) – During the Trojan war the Greeks presented Troy with a wooden horse as a sign of surrender but secretly it housed soldiers that once pulled inside the city willingly by citizens of Troy were able to open the gate for the rest of their army winning the war.  Trojan Horse (Computer Program) – A type of Malware that is similar to a computer virus except that it must be executed by the user where a virus does not.  Malware - meaning malicious software is any software meant to disrupt your computers function, destroy/gather sensitive information, or even give unauthorized access to your computer. 1

Vocab.  Hacker – The person that could be viewing all of the information on your computer, and does not even have to be the original Trojan horse creator. It can be anyone with a port scanner that knows how to access the malicious software.  Port Scanner - Software designed to scan or probe servers to find an open port. These ports are opened up when a Trojan Horse is executed and because the Trojan Horses carrying file does execute the intended program the Malware can go undetected.  Unsolicited – Given or sent with out being requested, basically any s you get that are not in reply to something you sent or are just a random with an attachment. 2

References  _(computing)  Horse-Viruses-Can-Infect-Your- Computer&id=  yalert-articles/trojan-horse-virus.htm