Top-Rated Free Essay
Preview

Trojan Horse

Good Essays
699 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Trojan Horse
Description
A Trojan horse is a malicious computer program hidden inside another program that masks its true purpose and appears to be legitimate. Trojan horses rely on users to install them or can be installed by intruders who have gained unauthorized access by other means. A Trojan horse can be sent as an attachment to an email message or can be placed on a website for an intruder to entice victims. A Trojan horse may be in the form of a Java applet, JavaScript, ActiveX control, or any other form of executable file. A Trojan horse is not considered to be a virus because it neither replicates nor copies itself automatically. When a Trojan horse is received in the form of an email, the program can mask its identity and do damage to the hard drive once the file has been executed. A Trojan horse is designed to cause damage to computer files or to compromise the security of the computer. Compromising a computer's security can happen when the Trojan horse provides remote control capabilities to hackers. Trojan horses can do anything that the user executing the program has the privileges to do. This includes deleting files that the user can delete, transmitting to the intruder any files that the user can read, changing any files the user can modify, and installing other programs such as programs that provide unauthorized network access including viruses and other Trojan horses. If the user has administrative access to the operating system, the Trojan horse can do anything that an administrator can. If a system on a network is compromised via a Trojan horse or any other method, the intruder may be able to install a network sniffer and record usernames and passwords or other sensitive information as it obstructs the network. Additionally, a Trojan horse could implicate a website as the source of an attack and could expose an organization to liability.

Solutions
The best advice with respect to Trojan horses is to avoid them all together. Other precautions should be initiated by the system administrators who should verify that every piece of software that is installed is from a trusted source and has not been modified. Additionally, anything sent via unsolicited electronic mail should not be executed. Some caution should also be taken when executing content such as Java applets, JavaScript, or Active X controls from web pages. It would be best to configure the web browser to disable the automatic execution of web page content. Another helpful solution would be to educate users regarding the dangers of Trojan horses, and to exercise caution when downloading unauthenticated software. If users choose to install software that has not been signed by a trusted source, users should be asked to wait for a period of time before installing the software in order to see if a Trojan horse is discovered. Users should also be warned to not rely on timestamps, file sizes, or other file attributes when trying to determine if a file contains a Trojan horse. The use of firewalls and virus products that can detect popular Trojan horses would be helpful. Although it is impossible to detect all possible Trojan horses using a firewall or virus product, these types of programs would aid in preventing many popular Trojan horses from affecting the computer system.
In some instances when users do become victims to a Trojan horse, some anti-virus software may also be able to recognize, remove and repair the damage from the Trojan horse. Installing and configuring a tool such as Tripwire would allow detecting changes to system files in a cryptographically strong way. However, if an intruder would gain access to the system via a Trojan horse, it might be difficult or impossible to establish trust in the system. It would be recommended that users disconnect from the network and that the computer system would be rebuilt from good known software and that all relevant patches and updates are applied and that all passwords are changed.
Conclusion
Until strong authentication of software is widely available, the problem of Trojan horses will persist. In the meantime, users and administrators are strongly encouraged to be aware of the risks.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Magazine advertisements spend millions of dollars each year in order to develop ideas to convey their message or to sell their products in today’s society. The many different views and values in society lead to various marketing ideas that capture the attention of many individuals, otherwise known as, the consumers. It is important to remember that the diverse preferences of the audience are taken into consideration when devising a marketing plan that would appeal to a wide range of people. Trojan, a company that focuses on the sale of contraceptives, spends millions of dollars each year to sell their products. In their most current advertising campaign, Trojan is trying to sell their newest brand of condom, Evolve. For this particular campaign, the marketing individuals promoting this product decided to show the differences between men and pigs by implying that men who use Trojan are considered to be true gentlemen while men who do not are regarded as pigs. While it seems that Trojan is suggesting the message of cleanliness by the usage of their condom, nonetheless, they themselves are not “clean” because of the message that they are conveying.…

    • 1821 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    “A&P’ by John Updike is a very comical short story. When I read this story for the first time I laughed the whole time but I also felt bad for Sammy towards the end. Sammy says “ I said I quit” Sammy ended up quitting his job just because he thought that the three girls were being treated very unfairly. It was hilarious when Sammy quit his job then he went to the parking lot to find the girls but they were not there. Sammy believed that the store manager Lengel wasn’t treating the three girls fairly so he stood up for what he believed in and quit his job. Sammy didn’t think that Lengel was being reasonable while talking to the girls. Queenie says “we weren’t doing any shopping. We just came in for one thing” (pg. 203) Then Lengel replies…

    • 524 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Symbolism In Moby Dick

    • 646 Words
    • 3 Pages

    Through the symbol of the wind as a microcosm for the natural world and Ahab’s interaction with the wind, Herman Melville argues that human will will never been able to subvert the natural world long term, and short term attempts will be at the cost of the individual. Throughout Moby Dick, Melville characterizes Ahab as ambitious and charismatic, a leader who constantly internally and externally compares himself to a god. The wind acts as a symbol, an object that represents a greater intangible motif, for the natural world. Through Ahab’s monologue about his interactions with the wind, his own helplessness within the natural world becomes evident. Ahab begins by stating “Were [he] the wind, [he]’d blow no more on such a wicked, miserable world” (Melville, 337),…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    Incapacitated Rape

    • 4238 Words
    • 21 Pages

    Several studies suggest that the frequency of sexual assaults that occur when the victim is unable to consent due…

    • 4238 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    “Confidence... thrives on honesty, on honor, on the sacredness of obligations, on faithful protection and on unselfish performance. Without them it cannot live.”- Franklin D. Roosevelt. Power, honor and respect, or simply love by who ever who choose. In the story of the Trojan war Paris clearly chose love. Little did he know that it would spark rage between the Greeks and the mighty people of Troy. Helen, the wife of King Menelaus, was put under a spell by the mighty Aphrodite and was practically forced to go with the Trojan prince Paris. Aphrodite cast the spell because Paris was ask to chose who was the prettiest in all of the land. In order to win she offered him a trade he could not resist. Power, honor and respect, or to be loved by…

    • 334 Words
    • 2 Pages
    Good Essays