Top-Rated Free Essay
Preview

Trojan Horse

Good Essays
699 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Trojan Horse
Description
A Trojan horse is a malicious computer program hidden inside another program that masks its true purpose and appears to be legitimate. Trojan horses rely on users to install them or can be installed by intruders who have gained unauthorized access by other means. A Trojan horse can be sent as an attachment to an email message or can be placed on a website for an intruder to entice victims. A Trojan horse may be in the form of a Java applet, JavaScript, ActiveX control, or any other form of executable file. A Trojan horse is not considered to be a virus because it neither replicates nor copies itself automatically. When a Trojan horse is received in the form of an email, the program can mask its identity and do damage to the hard drive once the file has been executed. A Trojan horse is designed to cause damage to computer files or to compromise the security of the computer. Compromising a computer's security can happen when the Trojan horse provides remote control capabilities to hackers. Trojan horses can do anything that the user executing the program has the privileges to do. This includes deleting files that the user can delete, transmitting to the intruder any files that the user can read, changing any files the user can modify, and installing other programs such as programs that provide unauthorized network access including viruses and other Trojan horses. If the user has administrative access to the operating system, the Trojan horse can do anything that an administrator can. If a system on a network is compromised via a Trojan horse or any other method, the intruder may be able to install a network sniffer and record usernames and passwords or other sensitive information as it obstructs the network. Additionally, a Trojan horse could implicate a website as the source of an attack and could expose an organization to liability.

Solutions
The best advice with respect to Trojan horses is to avoid them all together. Other precautions should be initiated by the system administrators who should verify that every piece of software that is installed is from a trusted source and has not been modified. Additionally, anything sent via unsolicited electronic mail should not be executed. Some caution should also be taken when executing content such as Java applets, JavaScript, or Active X controls from web pages. It would be best to configure the web browser to disable the automatic execution of web page content. Another helpful solution would be to educate users regarding the dangers of Trojan horses, and to exercise caution when downloading unauthenticated software. If users choose to install software that has not been signed by a trusted source, users should be asked to wait for a period of time before installing the software in order to see if a Trojan horse is discovered. Users should also be warned to not rely on timestamps, file sizes, or other file attributes when trying to determine if a file contains a Trojan horse. The use of firewalls and virus products that can detect popular Trojan horses would be helpful. Although it is impossible to detect all possible Trojan horses using a firewall or virus product, these types of programs would aid in preventing many popular Trojan horses from affecting the computer system.
In some instances when users do become victims to a Trojan horse, some anti-virus software may also be able to recognize, remove and repair the damage from the Trojan horse. Installing and configuring a tool such as Tripwire would allow detecting changes to system files in a cryptographically strong way. However, if an intruder would gain access to the system via a Trojan horse, it might be difficult or impossible to establish trust in the system. It would be recommended that users disconnect from the network and that the computer system would be rebuilt from good known software and that all relevant patches and updates are applied and that all passwords are changed.
Conclusion
Until strong authentication of software is widely available, the problem of Trojan horses will persist. In the meantime, users and administrators are strongly encouraged to be aware of the risks.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Trojan War Research Paper

    • 5157 Words
    • 21 Pages

    The Trojan War pitted a loose alliance of independent Greek kings against the city of *Troy (in what today is northwest Turkey) and her allies in Asia Minor. It is said to have begun with an insult to the goddess Eris ("Strife" or "Discord"). When the Greek hero *Peleus married the minor sea-goddess *Thetis, all of the gods were invited to the wedding except Eris. Angry at this, she placed on the banquet table a golden apple inscribed with the words: "For the fairest." Immediately strife broke out between the various goddesses at the wedding, all of whom claimed the apple for themselves. (Today we still refer to the *Apple of Discord: does this story remind you of any other famous apples?) Three goddesses were determined to have the best claim: *Hera, sister and wife of *Zeus, queen of the gods, goddess of marriages, and a force to reckon with; *Athena, daughter of Zeus, a powerful warrior goddess associated…

    • 5157 Words
    • 21 Pages
    Better Essays
  • Powerful Essays

    Magazine advertisements spend millions of dollars each year in order to develop ideas to convey their message or to sell their products in today’s society. The many different views and values in society lead to various marketing ideas that capture the attention of many individuals, otherwise known as, the consumers. It is important to remember that the diverse preferences of the audience are taken into consideration when devising a marketing plan that would appeal to a wide range of people. Trojan, a company that focuses on the sale of contraceptives, spends millions of dollars each year to sell their products. In their most current advertising campaign, Trojan is trying to sell their newest brand of condom, Evolve. For this particular campaign, the marketing individuals promoting this product decided to show the differences between men and pigs by implying that men who use Trojan are considered to be true gentlemen while men who do not are regarded as pigs. While it seems that Trojan is suggesting the message of cleanliness by the usage of their condom, nonetheless, they themselves are not “clean” because of the message that they are conveying.…

    • 1821 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Trojan War Research Paper

    • 649 Words
    • 3 Pages

    “Tell me, O Muse, of that ingenious hero who travelled far and wide after he had sacked the famous town of Troy” (Homer/”The Odyssey”). The Trojan War was an essential part of Greece’s history and shaped the way that we comprehend Greek mythology. It paved the path of many Greek citizens’ lives and society. We always knew that Helen, Menelaus and Paris were crucial to Greece’s history and shaped the way for numerous stories such as Homer’s The Odyssey. Helen and Paris, impacted the Trojan War through their strong love, actions, and decisions.…

    • 649 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • A COMPUTER VIRUS is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged. • Creating and disseminating computer viruses is one of the most widespread types of cybercrimes. Tens of thousands of new viruses or modified versions of old viruses are released each year. • Viruses normally attempt to hide within the code of a host program to avoid detection. Viruses, by definition, have a method to spread themselves. • Any computing device such as a smartphone, notebook, netbook, or iPad can be infected with a virus. Even your car, which now contains embedded computer systems, could catch a virus, especially if it connects to the Internet for software updates.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Trojan War Thesis

    • 653 Words
    • 3 Pages

    From the reading the Trojan War we can see that the Mycenaean people regard themselves as inferior to the gods, and are the gods pawns meant to carry out what they will not do themselves. Since the Trojan War is a document taken almost entirely from Homer’s Iliad, as well as a variety of poems written around the time, the insecurities of the Mycenaean are clear as they themselves created gods to worship who have little to no respect for the human race. The gods treat the humans as their pawns, encouraging them to do things they would not do themselves. “The murderous War-god urged was there to urge men on to slaughter each other” (Trojan War 266). By studying the gods’ treatment of the people we are able to get more insight into Mycenaean life.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Confidence... thrives on honesty, on honor, on the sacredness of obligations, on faithful protection and on unselfish performance. Without them it cannot live.”- Franklin D. Roosevelt. Power, honor and respect, or simply love by who ever who choose. In the story of the Trojan war Paris clearly chose love. Little did he know that it would spark rage between the Greeks and the mighty people of Troy. Helen, the wife of King Menelaus, was put under a spell by the mighty Aphrodite and was practically forced to go with the Trojan prince Paris. Aphrodite cast the spell because Paris was ask to chose who was the prettiest in all of the land. In order to win she offered him a trade he could not resist. Power, honor and respect, or to be loved by…

    • 334 Words
    • 2 Pages
    Good Essays