1 / 5

trojanhorse

stuff about alot more stuff<br>

fraide23
Download Presentation

trojanhorse

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TROJAN HORSE UNIT ONE CYBERSECURITY - MALWARE

  2. How Does It Work? A "Trojan Horse", or Trojan virus, is a type of malware that tricks the user into thinking its a real software. when the user clicks that software it allows Trojan Horses to: 1) Delete your data. 2) block your data. 3) disrupt the performance of your network.

  3. How Is It Removed? this virus is removed doing the following: - restarting your computer in safe mode. this allows you to find out more about the virus that was hiding in normal mode. - remove any programs you dont recognize, as the virus will install unwanted programs. -scan your computer with an anti-virus software and delete the virus from there.

  4. Some Real World Examples 1) http://thenextweb.com/asia/2011/10/25/japanese-government-hit- by-chinese-trojan-horse-attack/#gref 2) https://www.secureworks.com/research/bankingprg 3) http://www.techtimes.com/articles/19698/20141108/russian- trojan-horse-in-computers-of-u-s-critical-infrastructures-since- 2011.htm

  5. How Does Social Engineering Go Into This? social engineering is attacker using human interaction to obtain information about an origination or its computer system. Trojan horse is a malicious (bad) software used to harm the users data without their consent . Social engineering goes into this because, like a Trojan horse, it allows the hacker or bad software to obtain your information/data.

More Related