By: Kayla Adams
Table of Contents
INTRODUCTION ............................................................................................................................................. 2 DEFINITON, HISTORY..................................................................................................................................... 3 PURPOSE, HOW TROJAN HORSE WORKS ...................................................................................................... 4 TROJAN HORSE IN SAUDI ARABIA ................................................................................................................. 7 REFERENCES…………………………………………………………………………………………………………………………………………….8 APPENDIX………………………………………………………………………………………………………………………………………………..9
1
INTRODUCTION
Trojan horse is a program which contained a malicious or harmful code inside data that can control or damage the data, such as erasing data in the hard drive and may change computing system into a killing machine. Trojan virus has become common among hackers and the availability of advertising services that permit authors to violate the user’s privacy. 83 percent of the global malware is Trojan virus according to BitDefender from January to June 2009. This paper would generally talk about: History of Trojan Horse virus, Types of Trojan Horse Virus, How Trojan virus is used to control a computing system or data.
I decide to write about this topic hope that the readers would understand the Trojan Virus issues and how to control it.
2
DEFINITON, HISTORY
Trojan Horse is one of the malware (malicious software) that is used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer system. Trojan Horse is named after the Greek myth, from the siege of Troy. When the Greeks placed a large wooden horse outside the gates of Troy, the Trojans assumed it was a peace offering from the Greeks, and
References: Cell Phones: Viruses Are Catching Nov 19, 2006 7:00 PM EST