What is a Trojan Horse Virus? It is a program that is downloaded usually with a music or move file. They usually will erase memory, send credit card #s.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Threats Grade 10.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
SECURITY CHECK Protecting Your System and Yourself Source:
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Viruses & Destructive Programs
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
VIRUSES and DESTRUCTIVE PROGRAMS
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Staying Safe Online Keep your Information Secure.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Viruses.
TROJAN HORSE ATTACKS By MOHD HAZRIL B.MOHD RAZALI IBNU KHALDUN.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
By Demi Gardiner 8P Who’s been on your computer??
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Trojan Horses What you need to know about one of the world’s most dangerous forms of malicious code.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
How to protect your computer By: Emily, Jackie and Kathleen.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
Computer Skills and Applications Computer Security.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
VIRUSES and DESTRUCTIVE PROGRAMS
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Worms, Viruses and Other Creepy Computer Things:
Presentation transcript:

What is a Trojan Horse Virus? It is a program that is downloaded usually with a music or move file. They usually will erase memory, send credit card #s and passwords to strangers and let them steal identities without the person knowing it.

Why is it called a “Trojan Horse”? Legend has it that the Greeks won the Trojan war by hiding in a huge, hollowed out horse that was given as a gift to the city of Troy. They were then able to sneak in without anyone knowing and then captured the city and won their war. This program sneaks in with another downloaded file and gives out your information without you knowing it ever happened.

It isn’t actually a virus It is actually a destructive program that masks itself as being a normal application. Viruses replicate themselves Trojan Horses do not replicate. Some of the Trojan Horses actually are downloaded as file to get rid of viruses.

How will you know if you’ve been infected? People are asking you why you’re trying to send them computer viruses or Trojan horses You can unhide your file extensions such “exe”, “vbs”, “com”, “bat”, etc. A Trojan horse will have multiple extensions because it attaches itself to other files that might look something like “LOVE-LETTER-FOR-YOU.TXT.vbs”

How to avoid downloading them Download a good virus scan to check your computer for such files. Get a virus scan that will do updates to try and keep track of what’s going into your computer. Firewalls are good to have but don’t do that much against them because you’re downloading it.

Other ways to avoid Trojan Horses Don’t download blindly from sites you aren’t 100% sure about. Know what files you’re opening even if you think it’s from a friend. Look out for file extensions. Don’t think that you are 100% protected just because you have a virus-scan program because they aren’t perfect.

How to fight off Trojans if infected You need to do a Clean Re-installation. This is the only sure way to get rid of a Trojan or virus. Save everything you need on your computer. Reformat the disk and re-install you operating system.

Bibliography Lo, Joseph. "Trojan Horse Attacks." Online posting. 14 Oct Apr Webopedia. 18 Feb Apr "Fake Microsoft Update Is Trojan Horse." Wireless: NewsFactor 11 April April 2005