TROJAN HORSE - PowerPoint PPT Presentation

1 / 8
About This Presentation
Title:

TROJAN HORSE

Description:

... made downloadable programs for users through chat rooms and message boards. ... If a user spends time in chat rooms, there is a greater chance of receiving a ... – PowerPoint PPT presentation

Number of Views:192
Avg rating:3.0/5.0
Slides: 9
Provided by: lauriebu
Category:
Tags: horse | trojan | chat | rooms

less

Transcript and Presenter's Notes

Title: TROJAN HORSE


1
TROJAN HORSE
  • Non-viral malicious code
  • Named for the mythological namesake Trojan
    horse
  • Hidden behaviors come out in programs and can
    vanquish your data.
  • Trojan horses unlike viruses do not spread.
  • Were originally created in the late 70s/early
    80s as academic and hacking challenges.

2
HISTORY OF TROJAN HORSES
  • In late 80s, FidoNet bulletin boards made
    downloadable programs for users through chat
    rooms and message boards.
  • Programs claim to do one thing, but actually did
    another.
  • Dirty Dozen list was established in 1985 to list
    warnings about certain programs with Trojan
    Horses.

3
EXAMPLES
  • CDIR.COM Program is supposed to give you a
    color directory of files on your disk, but it
    will scramble your disks FAT table.
  • DROID.EXE a game that actually copies files to
    unexpected locations.
  • EGABTR supposed to improve your EGA display,
    but when run, it deletes everything in sight and
    prints Arf! Arf! Got you!

4
TROJAN HORSE
  • A program which someone tells you is legitimate
    software, but actually does something other than
    what the person claims.
  • Usually it is passed from person to person.
  • Discretion in choosing whom you accept programs
    from would reduce this problem.
  • Dont run anything you dont understand!!!

5
TROJAN HIDING APPLICATIONS
  • A program that the user thinks will do one thing,
    actually does that thing, but also does something
    else which the user would not approve of.
  • Can compromise your user ID and password
    combinations, as well as credit card and other
    personal information.

6
SUSCEPTIBILITY
  • If a user spends time in chat rooms, there is a
    greater chance of receiving a Trojan Horse from
    another user.
  • AOL users more susceptible to receiving Trojan
    Horses
  • Customize features
  • Large user population
  • Unskilled user population
  • Anonymity

7
SECURE YOUR SYSTEM
  • Employ computer security measures
  • Firewalls
  • Passwords
  • Separation of duties
  • Security against direct attacks must be built and
    designed into the systems aftermarket software
    is not going to solve the problem.

8
CONCLUSION
  • Trojan Horses are not a new threat to computer
    users.
  • Use and update anti-virus software
  • Follow good security practices
  • Keep aware of new developments in the field.
  • Never download files attached to email from
    someone you dont know.
Write a Comment
User Comments (0)
About PowerShow.com