Trojan Virus

Topics: Malware, Computer virus, Trojan horse Pages: 6 (1500 words) Published: June 28, 2013
TROJAN HORSE VIRUS
By: Kayla Adams

Table of Contents

INTRODUCTION ............................................................................................................................................. 2 DEFINITON, HISTORY..................................................................................................................................... 3 PURPOSE, HOW TROJAN HORSE WORKS ...................................................................................................... 4 TROJAN HORSE IN SAUDI ARABIA ................................................................................................................. 7 REFERENCES…………………………………………………………………………………………………………………………………………….8 APPENDIX………………………………………………………………………………………………………………………………………………..9

1

INTRODUCTION
Trojan horse is a program which contained a malicious or harmful code inside data that can control or damage the data, such as erasing data in the hard drive and may change computing system into a killing machine. Trojan virus has become common among hackers and the availability of advertising services that permit authors to violate the user’s privacy. 83 percent of the global malware is Trojan virus according to BitDefender from January to June 2009. This paper would generally talk about:    History of Trojan Horse virus, Types of Trojan Horse Virus, How Trojan virus is used to control a computing system or data.

I decide to write about this topic hope that the readers would understand the Trojan Virus issues and how to control it.

2

DEFINITON, HISTORY
Trojan Horse is one of the malware (malicious software) that is used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer system. Trojan Horse is named after the Greek myth, from the siege of Troy. When the Greeks placed a large wooden horse outside the gates of Troy, the Trojans assumed it was a peace offering from the Greeks, and moved the horse inside the gates. The wooden horse was of course filled with hidden warriors, and once inside the gates, they broke out of the horse, and demolished the Trojans. Trojan Horse virus work the same way.

3

PURPOSE, HOW TROJAN HORSE WORKS

Other than spyware and backdoor programs, Trojan Horse usually found in software download from unknown or untrusted sources. Even though it does not reproduce itself as a virus does, its ability to destroy files and install programs without the user knowing do indeed make it virus. Trojan Horse work by entering the victim’s computer undetected and then allowing a remote user unrestricted access to any data stored on the user’s hard disk drive whenever he or she goes online. In this way, it may only be discover when it is too late. Nowadays though, Trojans have threatening purpose. The primary objective is to allow the third party gaining access to a victim’s computer without their knowledge (Trojan is being used as spyware). Once that has been done, the intruder can do anything with the computer that the user do. The intruder would browse the user’s hard drive in order to find valuable information on it, for example, research papers, credit card details, password to restricted websites, etc. Once it’s found, the intruder can copy the data to his own hard drive as if the user copies a file to a USB in the exact same way. The worse thing is that all this process is hidden from the user although the user might be sitting in front of the computer on the same time. The noticeable indication may happen is unusual hard drive activity.

The intruder can also delete (system) files, erasing valuable data or ultimately destroying the hard drive by simply adding a command to the autoexec.bat file. The next time the unsuspecting victim boots the computer, it will automatically run the format command. Adding a certain flag to that command will also render the hard disk unusable.

4

Passwords aren’t guarantee today...


References: Cell Phones: Viruses Are Catching
Nov 19, 2006 7:00 PM EST
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Virus Case Study Essay
  • What Are Some of the Motivations for Virus Programmers? Essay
  • Essay on Love Bug Virus
  • Managing the Virus Hunters Essay
  • computer virus Essay
  • What Worms and Trojan Horses Are Essay
  • Essay on Computer Virus
  • Essay on Life Cycle of a Virus

Become a StudyMode Member

Sign Up - It's Free