[go: up one dir, main page]

0% found this document useful (0 votes)
75 views6 pages

Trojan Horse: Term Paper Report ON

The document discusses Trojan horse viruses. It begins with an introduction that defines a Trojan horse and explains how it differs from a virus. It then provides details on the objectives, types, and techniques of Trojan horses. The document outlines how Trojan horses can be used to gain remote access, record keystrokes, commandeer systems, and spy. It also categorizes different types of Trojan horses like remote access, data sending, destructive, proxy, FTP, and security software disabler Trojans. The document concludes with recommendations on precautions like installing antivirus software and not opening suspicious files to prevent Trojan horse infections.

Uploaded by

Rishab Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views6 pages

Trojan Horse: Term Paper Report ON

The document discusses Trojan horse viruses. It begins with an introduction that defines a Trojan horse and explains how it differs from a virus. It then provides details on the objectives, types, and techniques of Trojan horses. The document outlines how Trojan horses can be used to gain remote access, record keystrokes, commandeer systems, and spy. It also categorizes different types of Trojan horses like remote access, data sending, destructive, proxy, FTP, and security software disabler Trojans. The document concludes with recommendations on precautions like installing antivirus software and not opening suspicious files to prevent Trojan horse infections.

Uploaded by

Rishab Agrawal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Term Paper Report ON

Trojan Horse
submitted in partial fulfilment of the requirements for the degree
Of
BACHELORS OF TECHNOLOGY
In
COMPUTER SCIENCE AND ENGINEERING
Submitted by:

Aamir Patel (11605949 / KE014 / 20)

Under the esteemed guidance of

MS. VASUDHA

School of Computer Science and Engineering


Lovely Professional University
Phagwara, Punjab
SEPTEMBER 2019-2020
Study on Trojan Horse
Abstract - In recent years, the network, while internet has
fast development of computer become indispensable in life,
network technology, has become work, and study. However, the
an integral part of human’s life, virus attack becomes increasingly
work and study. But with the popular because of the
popularity of the Internet, development and strengthening of
computer viruses, Trojans and internet. Various attack methods
other new terms have become greatly threat the property security
some well-known network of human beings. Trojan horse
vocabularies. Studies have shown virus is one of the major methods
that most users of computer are of network Therefore, we have to
more or less suffered from make study to know more
computer virus. So people must fundamental knowledge,
attach great importance to the communication methods, and
network security problem. The work process to take
paper studied Trojan virus. Paper precautionary measures to further
first introduced the concept, enhance the network protection
characteristics and categories of and construct harmonious network
the Trojan virus and its harm, and environment.
then focused on the way and A Trojan Horse describes the
means of the Trojan’s spread. It class of the malware that appears
introduced the Trojan virus loading to perform a desirable function but
and hiding technology, too. Its last in fact perform undisclosed
part focused on the prevention malicious functions that allows
measures, it put forward unauthorized access to the
reasonable suggestions to users, victim’s computer. A Trojan Horse
and paper also put forward program is a unique form of
prevention advice to improve computer attack that allows a
network security. remote user a gaining access to a
Introduction - The current world victim’s computer without their
has entered into information time Knowledge. Trojan Horse initially
with the development of computer appears to be harmless, but later
proves to be extremely  Uploading and downloading
destructive. Trojan Horse is not a of files.
Virus because it can be access
 “Overwriting” it has
remotely and it cannot replicate
permission of erasing and
itself.
overwriting of the data.
The term comes from a Greek
story of the Trojan War, in which
Types –
the Greeks give a giant wooden  Remote Access
horse to their foes, the Trojans, Trojans
ostensibly as a peace offering. But
 Malware
after the Trojans drag the horse
program that
inside their city walls, Greek
include backdoor
soldiers sneak out of the horse's
for administrative
hollow belly and open the city
control over
gates, allowing their compatriots to
victim’s
pour in and capture Troy.
computer.
Objective –  Example – Snort,
 “Backdoor” it allows the OSSEC, Bro.
remote access to user to  Data Sending Trojans
control victim’s computer.
 “Record Keystrokes” to  Malware
stoles information of credit program that
card and victim’s Id and relays sensitive
password. information back
to the user.
 “Commandeering” it
commandeering the system  Example –
to distribute malware or Eblaster.
spam to other’s computer.
 Destructive Trojans
 “Spying” it spying on victim’s
 Malware
activities by sending
program that
screenshot of victim’s
delete or destroy
monitor to the remote
the victim’s
location.
computer.
 Destructive disable antivirus
Trojans are or firewall.
written as simple
 Example –
crude batch files
Trojan.win32.Dis
with commands
abler. b
like "DEL,"
"DELTREE" or  Denial-of-Service
"FORMAT." attack(DOS) Trojans
 Example – Hard  Malware
disk killer. program that
attack network
 Proxy Trojans
by flooding it.
 Malware
 Example - PC
program that
Cyborg Trojan.
convert victim’s
computer into Technique –
proxy server.
 Download or create a
 Example – Troj malicious code.
and Proxy-GG  Create another file and
program of same name to
 FTP Trojans
confuse user.
 Malware  Combine malicious code to
program that the safe program file.
allow access to  Use a wrapper tool to wrap
the confidential the file.
file or exposing  Send the file to the victim.
data.
 Example – Prevention-
Trojan.win32.FT  Install latest security patches
P Attack for the operating system.
 Security Software  Install Anti-Trojan software.
Disabler Trojans
 Install Anti-virus software
 Malware and update it regularly.
program that
 Install a secure firewall.
 Do not give strangers  We need to be smart user.
access (remotely or  Computer virus and
physically) to the computer. malicious program code are
increasing rapidly with the
 Do not run any unknown or thriving growth of internet
suspicious executable technology, so we must
program. constantly focus on
 Scan all email attachments developing new and most
with an antivirus before effective way to fighting
against attack.
opening it.
 We have to popular the
 Do regular backup of your method of prevention from
system. viruses and malicious codes.
 Moreover, school and
 Do not run commands or go colleges should enhance the
to the web address study on computer virus and
mentioned by strangers. malicious code and aim for
 Do not open instant developing new antivirus
message attachments from software.
unknown people.
 Do not use pee-to-peer Reference and Author –
sharing network because Author -
they do not filter out
 ZHU Zhenfang: PhD,
malicious program hidden in
lecturer, at Shandong
shared files.
Jiaotong University
and published more
than 30 papers over
Conclusion –
the year.
 We need to be careful when (https://www.researchg
we download something. ate.net/profile/Zhu_Zh
 We need a secure firewall enfang).
and best antivirus software.
Reference -
security-center/pc-
security/computer-
 https://www.bullguard.
com/bullguard-
threats/what-is-a- malware-what-is-a-
trojan-horse trojan.html
 http://www.irchelp.org/  https://www.kaspersky.
security/trojan.html co.in/resource-
center/threats/trojans
 https://www.lifewire.co
m/what-is-a-trojan-  https://www.pcsecurity
virus-4587082 world.com/83/trojan-
horse-malware-
 https://searchsecurity.t
detection-
echtarget.com/definitio
prevention.html
n/Trojan-horse
 https://www.sciencedir
 https://www.webopedia
ect.com/topics/comput
.com/TERM/T/Trojan_
er-science/trojan-
horse.html
horse-program
 https://us.norton.com/i
nternetsecurity-

You might also like