Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Trojan Horse Program Presented by : Lori Agrawal.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Trojan Horse Chris Wise & Jacob Summers. Overview What is Trojan Horse? Types of Trojan Horses? How can you be infected? What do attackers want?
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Cyber crime & Security Prepared by : Rughani Zarana.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
TROJAN HORSE ATTACKS By MOHD HAZRIL B.MOHD RAZALI IBNU KHALDUN.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security By Duncan Hall.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
IT Security  .
Computer Applications Unit B
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security By: Muhammed Anwar.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Trojan Horses on the Web

Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an entirely different action and most of the time it would damage either the person or their computers. Now-a-days Trojan horse are probably the most wide-spread security threat! The name “Trojan Horse ” was derived from the story of how Odysseus of the Greeks tricked the people of Troy with a gift, that actually would lead to their demise.

How Trojan Horses Work Some one trying to execute a Trojan Horse would begin by disguising their software as a benign or beneficial software. Then distribute the software via or links from given websites. Users are then fooled into downloading this maliciously disguised software, which then corrupts user and or his computer. The attackers goals during the course of this operation include: erasing and overwriting data on a computer, encrypting files, discretely corrupting files, uploading and downloading corrupt files, taking control of users computer, re-installing itself after being disabled, making screenshots, data harvesting, etc.

Security Software Disablers Trojans that disable anti-virus or firewalls. This allows the attacker to penetrate the system with ease. The compromised system is now vulnerable to attacks from the internet.

Denial-of-Services (DOS) Denial of Services or DOS is a type Trojan horse. Denial of Services turns the victims computer into a zombie. Together with other zombie machines they attack a server over the internet to consume all of its resources and bring down the server. For this to be affective many zombie machines are required overflow the servers capacity level.

Example of DOS

Keylogger This kind of Trojan monitor the key strokes on a keyboard and sends them back to an foreign location. This kind of Trojan monitor the key strokes on a keyboard and sends them back to an foreign location. Often keyloggers are used in identity theft crimes cause they can get strings of information. For example, bank account numbers, credit cards, account passwords, user names, etc.

Here is an example of how to avoid keylogging:

Remote Access Trojans Remote access Trojans allows third party users to take complete control over a victims system. This allows an attacker to violate a users computer from another location. They can hijack keyboard and mouse movements giving the attacker control of a victims system. They can do tasks as simple as opening and closing a CD-Rom tray. They can do tasks as simple as opening and closing a CD-Rom tray.

Data destruction of Trojans The goal of this Trojan is to erase or corrupt data stored on this computer. This would be done to erase memory or information that would usually benefit the attacker. For example, corporate sabotage or removal of an important machine from service. Also, this can be used for extortion when the hacker will corrupt original file and charge victim for return of impertinent information. Attackers main motive for this is profit.

Consequences to User Loss of identity Loss of identity Permanent damage to hardware Permanent damage to hardware Corruption of files in an operating system Corruption of files in an operating system Financial loss to corporations or user Financial loss to corporations or user Increase in spam Increase in spam Reduction of system performance Reduction of system performance

Difference between Trojan Horse and other computer Attacks Viruses attached themselves to legitimate previously installed software. Require a human action to infect the system. A worm have the ability to self replicate and spread from machine to machine without the need form human interaction. Trojan Horses have none of these attributes.

How Trojan Horses have evolved Recent shifts in hacker focus on how compromised web servers are now becoming an important in attacks against users and the threat of automated web attacks. The attackers are focusing on the vulnerable servers to get their victims easier.

Demographics Current Research shows that they are: Cauasian Cauasian Male Male years old years old Middle class Middle class Limited Social Skills Limited Social Skills Perform poorly in school: aptitude for computers and technology Perform poorly in school: aptitude for computers and technology Dysfunctional families. Dysfunctional families.

Types of Hackers NOVICE - Limited computer skills. CYBER-PUNKS – Better understanding of how the attack works. INSIDERS – Disgruntled employee or ex- employee able to carry out the attack due to inherent privelegs. CODERS – Technically skilled, writes the scripts and automated tools.

PROFESSIONAL – Criminals, thieves, highly trained in state of the art equipment and very motivated. CYBER-TERRORISTS – well funded, political motives with criminal intent.

Major Attacks In 2000 Bill Gates’ Microsoft operating systems suffered a major attack from Trojans horses when they discovered a security error in the Microsoft operating system. The notepad application was infected and the Trojan spread itself through the network to affect other computers that were connected. This allowed access to source codes for the hackers. Even worse the Trojans also rewrote the system registry so that whenever the system rebooted the Trojans is reloaded back into the system.

Examples of Trojan Horses

Prevention of Trojan Horse Attacks Anti-Virus/ Anti-Trojan software Be aware of what you upload and download to your operating system. Monitor the sites and files your visit and use.

Conclusion Trojan Horses is a piece of software that allows the user think that it does a certain task, while actually does an entirely different task and damages an vulnerable system. Trojan Horses can be used to steal an individuals identity, corrupt data, and permanent hardware damage.

Questions??