Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.

Slides:



Advertisements
Similar presentations
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
Why is your computer sick? …And how you can cure it CLICK HERE TO FIND OUT.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Security Computer Security as a principle; Computer Security in UNIX for specific; Conclusion.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Computer Viruses A guide to virus protection,detection, and removal for the average computer user.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
D. Beecroft Fremont High School VIRUSES.
Computer Viruses.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
For more notes and topics visit: eITnotes.com.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Return to the PC Security web page Lesson 5: Dealing with Malware.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
1 3 Computing System Fundamentals 3.7 Utility Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
COMPUTER VIRUSES Computer Technology.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Viruses.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy

Definition Types of Trojan Horse Types of Trojan Horse Payloads Process Main Category:- 5 How To Avoid From Be Infected 6 How To Remove 7 Conclusion

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A Trojan Horse is a program that installs malicious software while under the guise of doing something else. DEFINITION

There are two common types of Trojan horses: 1.One is ordinary software that has been corrupted by hacker. A cracker inserts malicious code into the program that executes while the program is used. Example : crack software,p2p file sharing utilities. 2.Standalone program that masquerades as something else,like a game or image file, in order to trick the user into running the program. Types Of Trojan Horse

There are two types of Trojan Horse : -Time Bomb and Logic Bomb -Droppers Type Of Trojan Horse payloads

1-Time Bomb activate on particular dates and times. 2-Logic Bomb activate on certain condition met by computer. 3-Droppers perform two tasks at once. A dropper form a legitimate but also installs a computer virus or a computer worm on a system or disk at the same time. Process

Do not open the unexpected attachments on s Do not surf to the unknown website. Do not download anything from the stranger website. How To Avoid From Be Infected

Use the following tools : The program is called smitfraudfix siri.geekstogo.com/SmitfraudFix.php Just follow the instruction there Download Grisoft Avg 7.5 Anti-Virus, Anti-Malware.Free edition A-SQUARED emsisoft.com/en/software/free Anti-spyware comparison How To Remove

We need to be careful when download something. We also need an Anti-Malware and anti-virus to protect our computer from be infected by virus. We need to be a smart user because this can help us from be tricked with nice thing but behind the scenes it infects our computer with a Trojan or Worm. Conclusion

Reference qid= AAlllwf mputing)