1 / 17

B ackdoors

B ackdoors. By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke. A. A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. .

ponce
Download Presentation

B ackdoors

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Backdoors By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke

  2. A • A backdoor is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

  3. A backdoor might appear as an installed program called Back Orifice. It also may subvert the system through root kit. It allows hackers to sneak in and out of your computer at anytime.

  4. B • A backdoor is a type of malware that comes through other files and can take control of your computer, or help other viruses and malware take over your computer. A backdoor can come in many ways. Such as shareware, downloads, and uploads.

  5. Another method of distributing Backdoors involves tricking you by displaying deceptive pop-up ads that may appear as regular Windows notifications with links which look like buttons reading yes and no.

  6. No matter which "button" that you click on, a download starts, installing Backdoors on your system. Backdoors installs on your computer through a Trojan and may infect your system without your knowledge or consent.

  7. C • Backdoor is a Trojan code that uses stealthy techniques to penetrate computer systems and open back doors to forthcoming system attacks.

  8. When a backdoor successfully on board and it begins to perform obvious harmful activities that may damage your computer or steal personal info, your antivirus can detect its existence.

  9. D • A backdoor can come in many ways. Such as shareware, downloads, and uploads. Another method of distributing Backdoors involves tricking you by displaying deceptive pop-up ads that may appear as regular Windows notifications with links which look like buttons reading Yes and No.

  10. No matter which "button" that you click on, a download starts, installing Backdoors on your system. Backdoors installs on your computer through a trojan and may infect your system without your knowledge or consent.

  11. E • There are many ways to prevent backdoors. First (of course) get spyware preventers and keep them updated. Also you can use common sense, if you see a file that looks suspicious and you’ve never seen before, it is probably dangerous.

  12. Scan for backdoors frequently and don’t open files you didn’t download and don’t download files you don’t know about. Backdoors are sneaky and are used to help other viruses. It’s pretty much like the Trojan War when the Trojan horse was used to sneak army men into enemy camps and win the war.

  13. F • Spyware is programming that is put into your computer to secretly gather information and relay it to advertisers or other interested parties. • Worms are a virus variant that can infect a computer without any user interaction.

  14. Trapdoors are like a trap that you go through as in like a virus and collect the person’s data that you then have access to. • Cracks are an opening way to get in to access any data available.

  15. Trojan horse virus looks like a legitimate software program. Unlike traditional viruses that require the hacker to find and exploit a vulnerability on the target.  • Concealed stratagem is when you are tricked to thinking that there isn’t anything there but it is there.

  16. ??? Any questions?

  17. References • http://en.wikipedia.org/wiki/Backdoor_(computing) • http://searchsecurity.techtarget.com/definition/back-door • http://dictionary.reference.com/browse/backdoors • http://www.webopedia.com/welcomead/ • http://tinhat.com/ • http://www.enotes.com/search?q=backdoors

More Related