1 / 15

The Trojan Horse Virus

When using the Internet there is always the risk of running into some sort of a malware or the other, if proper security measures are not taken to keep oneu2019s system safe. This PPT aims at providing information about the malware, Trojan Horse. It touches upon its actions and characteristics in brief and then proceeds to provide more information on its various types along with the purpose of those types of Trojans.

htshosting
Download Presentation

The Trojan Horse Virus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Trojan Horse Virus

  2. Table of Contents • Types of Trojan Horses • More Types of Trojan Horses • Some More Types of Trojan Horses • More Types of Trojan Horses • Conclusion • Websites and Web Hosting Service Providers • Malware • Trojan Horse • Trojan’s Actions • Common Characteristic of all Trojans

  3. Websites and Web Hosting Service Providers • Each are every website that we visit is hosted on the web server of a web hosting company. These web hosting companies, which are also called web hosts, are responsible for leasing server space to website owners along with providing them the services and the technologies that are needed by a website in order to be accessible. • When one refers to a “Windows Hosting Company” or to a “Cloud Hosting Company” or even to the “best Web Hosting Company” in India or even abroad, one is essentially referring to web hosting service providers.

  4. Malware YELLOW • It refers to any malicious program that has been designed and installed onto a system with the intention of harming either the computer, computer network, the server or the user of these. Computer programs that act covertly to cause damage to data also fall in this category. It is made up of code that is developed by cybercriminals and its aim is to cause substantial damage to the data as well as the system that it targets. Its other aim is to have unauthorized access to a network. Any malware is usually delivered in the form of a file or a link that is sent over email. It requires the user to click on it, so that the malware can be executed. • A huge range of malware types exist. These can be computer viruses, Trojan Horses, worms, spyware, rogue software, ransomware, adware, wiper and scareware. • This PPT is aimed at shedding light upon the malware Trojan Horse in particular.

  5. Trojan Horse • A Trojan Horse or a Trojan is a kind of a malware that is often found in the guise of a legitimate software. These are used by cybercriminals to gain access to a particular system. One of its important characteristics is, it remains in the users’ systems covertly and does not let them find it. • The targeted user is tricked into loading and eventually triggering the execution of Trojans on their device. This is achieved by employing some sort of social engineering mechanism. Once these Trojans have been installed on the user’s system these facilitate gaining backdoor access to it for spying on the user, stealing his/her sensitive data along with personal information. These are capable of deleting the files of a user that are on that system as well as infecting other devices which are connected to that network. • Trojans are not able to self-replicate which sets these apart from computer viruses and worms.

  6. Trojan’s Actions • Once Trojans are activated these can fulfil the following purposes- • Copying data • Deleting data • Modifying data • Blocking data • Hampering the performance of computers or computer networks

  7. Common Characteristic of all Trojans • Four of the most common characteristics of every type of Trojan are mentioned below- • Fraudulent • Remains concealed • Capable of opening terminal automatically by using the communication means of client-server model • Can self-repair

  8. Types of Trojan Horses • Trojans are of the following types, which are mentioned in no particular order- • Backdoor  • This kind of a Trojan enables remote control over the targeted system by its sender, who has a malicious purpose. The cybercriminal accesses the legitimate user’s system without him being aware of it. Once a Backdoor Trojan is installed, it gives total power to the author to do everything that he/she wishes to do on the infected device. This enables him to do everything that the actual user can do on his system. These activities include but are not limited to reading data, sending files, receiving, launching and deleting files along with displaying data and rebooting the computer. This kind of a Trojan is used most frequently to form a botnet or a zombie network of the infected computers by uniting those, so that those can be used for criminal activities.

  9. Rootkit  • This kind of a Trojan is meant to conceal certain objects or activities in the user’s system. Usually its main aim is to ensure that malicious programs do not get detected. This is required to extend the duration for which such programs can run on an infected computer. • Exploit  • It is a kind of a program that contains data or code which is used to take advantage of a vulnerability that is within the application software which is running on the target’s computer. • Trojan-DDoS These programs are designed to conduct DoS (Denial of Service) attacks on a target web address. These overwhelm the target web address by sending multiple requests from the user’s computer and several other infected computers. This leads to a Denial of Service.

  10. More Types of Trojan Horses • Trojan-Banker A program of this type is used for the purpose of stealing the account data related to online banking systems, e-payment systems and credit or debit cards of the target user, whose system is infected by it. • Trojan-Downloader It can download and then install new versions of Trojans and adware as well as other malicious malware onto its target’s computer. The malware that already exists in the user’s system can be easily upgraded by it. • Trojan-Dropper It is a type of Trojan that is used for the purpose of installing Trojans and or viruses. It is used to prevent the detection of malicious programs as well. Every antivirus program is not capable of scanning all of the components that are in this Trojan. • Trojan-Game Thief It is used to steal a user’s account information from online games.

  11. Some More Types of Trojan Horses • Trojan-Fake AV This type of a Trojan simulates the activity of an antivirus software. It is designed to extract money from the user by giving him false information regarding the detection and removal of a cyber threat. It reports threats that do not even exist on the user’s system. • Trojan-IM  • Trojan-IM programs are meant to steal the logins and passwords from instant messaging programs, such as Skype, MSN Messenger, ICQ and many more. • Trojan-Ransom  • This type of a Trojan is designed to modify the data on the target’s computer. This is aimed at ensuring that the target’s computer doesn’t run correctly or is not able to use specific data any more. In this case the cybercriminal will only restore the target computer’s performance or unblock its data, after he receives the ransom that he had demanded. • Trojan-SMS  • These can cost the user money. These act by sending text messages from the target’s mobile device to premium rate phone numbers.

  12. 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?

  13. More Types of Trojan Horses • Trojan-Mailfinder • These are meant to harvest email addresses from the target’s system. • Trojan-Spy  • It is designed to spy on the target’s usage of his own system. It can track the data that is entered using the keyboard, take screenshots as well as collect a list of the applications that are running on the system.

  14. Conclusion With the increase in the use of Internet, the numerous threats posed by malware are looming large. Hence, every user of the Internet needs to be aware of the danger as well as the damage that a malware like Trojan Horse can cause to a user’s system and network. Every precaution must be taken to ensure proper security against malware like Trojan Horses, if one wants to avoid any mishap and use the Internet safely and fruitfully.

  15. Thanks! ANY QUESTIONS? You can find me at: www.htshosting.org www.htshosting.org/best-web-hosting-company-India www.htshosting.org/best-windows-hosting www.htshosting.org/best-cloud-hosting-company support@htshosting.org

More Related