E N D
TROJAN HORSE UNIT ONE CYBERSECURITY - MALWARE
How Does It Work? A "Trojan Horse", or Trojan virus, is a type of malware that tricks the user into thinking its a real software. when the user clicks that software it allows Trojan Horses to: 1) Delete your data. 2) block your data. 3) disrupt the performance of your network.
How Is It Removed? this virus is removed doing the following: - restarting your computer in safe mode. this allows you to find out more about the virus that was hiding in normal mode. - remove any programs you dont recognize, as the virus will install unwanted programs. -scan your computer with an anti-virus software and delete the virus from there.
Some Real World Examples 1) http://thenextweb.com/asia/2011/10/25/japanese-government-hit- by-chinese-trojan-horse-attack/#gref 2) https://www.secureworks.com/research/bankingprg 3) http://www.techtimes.com/articles/19698/20141108/russian- trojan-horse-in-computers-of-u-s-critical-infrastructures-since- 2011.htm
How Does Social Engineering Go Into This? social engineering is attacker using human interaction to obtain information about an origination or its computer system. Trojan horse is a malicious (bad) software used to harm the users data without their consent . Social engineering goes into this because, like a Trojan horse, it allows the hacker or bad software to obtain your information/data.