Uploaded by ora mar

Trojan Horse Virus Report

advertisement
Trojan Horse Virus Report
By: Ovan, Rohand
Class: 9B
Teacher: Ms Shanaz
Introduction:
A Trojan horse virus is malware that will download itself onto your device while
disguised as an average program, but actually contains harmful code that can
cause damage to a computer or network. The name Trojan horse came from the
ancient Greek story in which soldiers hide inside a giant wooden horse and sneak
into the city of Troy to launch a surprise attack waiting for the right moment to
attack and defeat Troy. Just like how a Trojan Horse virus sneaks into a computer
system by disguising itself as harmless or useful software and then attacking the
computer.
How does a Trojan horse virus work?
Trojan horse viruses can spread in quite a few ways such as, email attachments,
infected software downloads, or malicious websites. Once the virus is on the
computer it can perform quite a few different malicious action such as, stealing
the user’s personal data, deleting the user’s files, or taking control of the users
infected device.
One of the most common types of a Trojan horse virus is a "backdoor" Trojan, a
backdoor Trojan creates a hidden backdoor into the users infected computer
which allows the attacker to take control of the user’s system. Another common
type of Trojan horse virus is a "key logger" Trojan, a key logger Trojan logs the
keystrokes that the user makes and sends it to the attacker, this allows the
attacker to steal passwords and other personal information.
How to prevent and protect yourself from a Trojan horse virus:
In order to protect against Trojan horse viruses, the user should keep all anti-virus
and anti-malware software up-to-date and to prevent themselves from opening
any malicious files or attachments. It is also very important to keep your system
up-to-date, because many viruses will take advantage of your outdated software.
Users should also take care when visiting sketchy unfamiliar websites, as they
cause huge risk to computer systems and will likely steal your data. As long as you
take the proper precautions and stay safe your risk of infection will decrease and
your computer should stay safe from these harmful viruses.
Conclusion:
Trojan horse viruses are a massive threat to your devices security, because they
can cause significant damage and steal your personal information and data but as
long as you are careful and stay safe on the internet your device shall also stay
safe.
Download