DOC PREVIEW
SJSU CS 265 - Trojan Horse Program

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Name : Lori AgrawalTrojan Horse ProgramWhat is Trojan Horse ProgramHistory behind the naming convention of Trojan Horse ProgramHackers can take over of a user’s accountImpact of Trojan Horse ProgramExamplesSubSevenName : Lori AgrawalClass : CS265 Trojan Horse ProgramWhat is Trojan Horse ProgramTrojan Horse Program is one of the today’s most serious threats to computer security. This program not only effects a user’s computer, but that user can also infect and attack others system unknowingly. In today’s computer world, a Trojan Horse program is defined as “ malicious, security-breaking program that is disguised as something benign”.For example, a user download a file that appears to be a movie or song, but when he clicks on it, that user will get Trojan Horse program running on your system, and it can erase all of his data from his hard disk, send credit numbers and passwords to a stranger.A Trojan horse is a program, not a virus. It infects your computer and allows a hacker to get control over your computer. If your computer is infected, then it will be controlled totally by a hacker. Mostly home users are much targets of Trojan Horse programs because all other official organization and bank take care of this security in advance and keep a secure policy to prevent this type of attack.History behind the naming convention of Trojan Horse ProgramGreeks won the Trojan war by using a big hollow wooden horse to get to the city of Troy.The other side thought it is symbol of peace, but that horse was filled with Greek warriors. When the Trojan went to sleep, the warrior hidden inside of horse came out and won the battle. How Trojans Programs are Spread:Trojans Programs are spread in many ways such as email attachments, in chat room by sending files, and files placed on sites using fake names of games to download. Or they join a Trojan program file in a legitimate file and when you run it, you are aware of it, but a Trojan Program is installed in background and now it is sitting and waiting for hackers to connect and get control over your computer. When this program is executed, then Hacker will know that their victim is online and they have chances to do anything they want. Now Hackers will scan computers that are infected by Trojan Horse Program. They will get a list of cached password and they will use it to access users’ mail account or dial-up connection. The example of accounts that are taken over by Hacker are AOL and ICQ.Now sites you used to pay or subscribe and online banking accounts are accessible by Hackers.Hackers can take over of a user’s accountIf a user own a web site, then a hacker can access this site and exchange his personal and trusted files with Trojan programs, and then delete his web site and changing thepassword which will cause user’s hard work to go in waste and denying his access to website.Some hackers use ICQ takeover feature which is basically downloads a user’s ICQ database along with his personal and private chat history and its password to their own ICQ. Once they get succeed to do this, their next step is to log onto the ICQ as the user and they change password and the email address that ICQ can send to user if user request his lost email or password. Now the account is owned by the hacker and the user has verylittle chance to get it back. Their next step will be sending a message to all friends of the users on ICQ with a Trojan Horse program and as the user friends trust them from long time, they will download the file and run it. So hacker will get control over to other’s computers as well. Files Accessed by Hackers:Hackers can access a user file in a way as they are accessing them from their computer. They can access important and personal files such as Bank Statements.txt, Business_Proposal.doc, Carloan.txt, Credit Card Statement.txt, Holiday Arrangements.doc, Resume.doc, Mortgage Payments.txt, Password.txt. Hackers can alter victim’s documents. For example, if he has worked really hard on Resume and now searching for jobs online. If he finds some good openings and now he issending resume to Hiring manager, but the resume has been altered by the Hacker. He haschanged some information like why did you leave your last job, then you won’t get job inthe company you want to apply for. Hackers are usually interested to get people private documents. Some users have chat history stored and they like to get them and there have been cases of blackmail. Trojan horse program also display pictures on victim’s system. Many people have experienced this kind of problem. Hackers like to display some scenic pictures on victims screen, and it won’t go away until the user doesn’t restart his computer or by changing the computer wallpaper. Impact of Trojan Horse ProgramTrojan Horse program can do anything a user can do on his computer. This includes:1. It provides hackers a complete access to victim’s computer. 2. It can delete files that a user has privileges to delete.3. It can change any files that a user can modify.4. It can get an authorization to install other program with the privilege of the user, which a hacker doesn’t have an authorized network access.5. It can install other Trojan Horse program6. If the user has administrator privileges, then Trojan Horse can do anything that an administrator can. 7. If a Trojan Horse Program has been installed and initialized on a user computer, then that computer can be target and used by any one who knows how to connect that computer with Trojan Horse Server.How to avoid getting infected from this Trojan Program?1. You should never download a file from a site or people about which you are not 100% sure. Even you are downloading a file from a friend, you should be careful andknow about the content of file before opening it. 2. Need to be aware of hidden extension. 3. Don’t use a feature that automatically get files or preview files. It is convenient for users but any one can send them file by this way which is a problem. For example, don’t turn on “auto DCC get” in mIRC, besides this you should screen manually every file you get. Also, disable the preview mode in Outlook email program.4. Never go to a web site mentioned by a stranger or don’t type any command that a stranger tell you to type.5. Don’t download an executable file and don’t run it to just check it because once you run it first time, Trojan Program will infect your computer.


View Full Document

SJSU CS 265 - Trojan Horse Program

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Trojan Horse Program
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Trojan Horse Program and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Trojan Horse Program 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?