Preview

Trojan Virus

Powerful Essays
Open Document
Open Document
1500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Trojan Virus
TROJAN HORSE VIRUS
By: Kayla Adams

Table of Contents

INTRODUCTION ............................................................................................................................................. 2 DEFINITON, HISTORY..................................................................................................................................... 3 PURPOSE, HOW TROJAN HORSE WORKS ...................................................................................................... 4 TROJAN HORSE IN SAUDI ARABIA ................................................................................................................. 7 REFERENCES…………………………………………………………………………………………………………………………………………….8 APPENDIX………………………………………………………………………………………………………………………………………………..9

1

INTRODUCTION
Trojan horse is a program which contained a malicious or harmful code inside data that can control or damage the data, such as erasing data in the hard drive and may change computing system into a killing machine. Trojan virus has become common among hackers and the availability of advertising services that permit authors to violate the user’s privacy. 83 percent of the global malware is Trojan virus according to BitDefender from January to June 2009. This paper would generally talk about:    History of Trojan Horse virus, Types of Trojan Horse Virus, How Trojan virus is used to control a computing system or data.

I decide to write about this topic hope that the readers would understand the Trojan Virus issues and how to control it.

2

DEFINITON, HISTORY
Trojan Horse is one of the malware (malicious software) that is used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer system. Trojan Horse is named after the Greek myth, from the siege of Troy. When the Greeks placed a large wooden horse outside the gates of Troy, the Trojans assumed it was a peace offering from the Greeks, and



References: Cell Phones: Viruses Are Catching Nov 19, 2006 7:00 PM EST

You May Also Find These Documents Helpful

  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Pieces Of April Sociology

    • 607 Words
    • 3 Pages

    The dictionary definition of family is the members of one’s household, close relatives, or a social unit. Family does not always need to be of blood relation. Many times we find family in the comfort of our friends, partners, and others that surround us.…

    • 607 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Study Guide

    • 546 Words
    • 3 Pages

    Trojan horse: built by the Greeks to carry them into troy to defeat the Trojans…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Virus

    • 1318 Words
    • 6 Pages

    • Viral genomes can be either DNA or RNA • This genome, once inside a host cell, directs synthesis of new viral proteins, and also replication of new viral genomes • Viral genomes come in all kinds:…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Dive-by downloads, malicious code-worms and Trojans, both are considered top emerging threats to mobile computing in the European continent. Code injections this form of attach in currently on the rise due to proliferation of automated attack tools. This type of attack is mostly directed to management systems and targeted by cyber criminals. Moreover large scale automated attacks have become increasingly used to attack cloud computing service networks. Exploit kits according to the ENISA these kits are considered to be the biggest arsenal tool for cyber criminals to infiltrate network systems and commit cybercrimes. Botnets are threats that many companies have to fight and protect them self from these particular threat controls computers often without users being aware that their systems have been compromised. For Europe the threat is constantly evolving, which is why it is critical for companies to implement multilayer security that goes beyond tools and technology to prevent cyber criminals from infiltrating secured information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With hackers running rampant today, more demands are given by them, now with old-fashioned ransoms. Computer users are now faced with a virus called “ransomware”, which gives users an option of either giving up their data or retrieving it with a fee.…

    • 301 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    In addition,,it is a potential threat for the personal computer and the secret data of company,because these sensitive information is extremely easy to steal by all kinds of viruses or Trojans on internet.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays