Trojan Viruses - PowerPoint PPT Presentation

About This Presentation
Title:

Trojan Viruses

Description:

– PowerPoint PPT presentation

Number of Views:2
Slides: 10
Provided by: infosectrain02
Tags:

less

Transcript and Presenter's Notes

Title: Trojan Viruses


1
TROJAN
VIRUSES CUNNING DIGITAL FOES
2
TROJAN
www.infosectrain.com
learntorise
VIRUSES A Trojan virus, or Trojan horse, poses
as legitimate software but harbors malicious
code. Once triggered, it can steal data, install
additional malware, or disrupt your computer's
operation.
3
HOW TROJAN
www.infosectrain.com
learntorise
SNEAK IN Trojan viruses spread via email
attachments, infected websites, or peer-to-peer
networks. When you open an infected file, the
Trojan silently installs itself on your
computer. Once in, it executes malicious code,
posing a threat to your system.
4
TYPES OF TROJAN
www.infosectrain.com
learntorise
  • TRICKS
  • Backdoor Trojans Craft hidden entrances for
    remote system control.
  • Downloader Trojans Covertly fetch and install
    more malware.
  • Destructive Trojans Target files, causing
  • widespread damage and potential data loss.
  • 04 Remote Access Trojans (RATs) Gift attackers
    complete system control for data theft
  • and monitoring.

5
SPOTTING TROJAN
www.infosectrain.com
learntorise
  • TRICKS SIGNS
  • Sluggish Showdown Computer performance is
    slowing unexpectedly.
  • Pop-Up Carnival Strange ads and pop-ups
    disrupting your digital ride.
  • Browser Carousel Spin Homepage or search engine
    changes without consent.
  • 04 Software Sneak-Ins Programs that you didn't
    ask for appear on your computer.

6
05 Data Disappears Act Personal information
www.infosectrain.com
learntorise
mysteriously vanishes. 06 Network Oddities
Unusual activity on your network.
7
TROJAN CASTLE
www.infosectrain.com
learntorise
DEFENDING YOUR
  • Antivirus Shield Install and update antivirus
    software to thwart Trojan plans.
  • Attachment Vigilance Open email attachments
    cautiously scan them before unveiling.
  • Webs of Caution Stay away from suspicious
    websites hosting Trojan traps.
  • 04 Peer-to-Peer Pause Avoid the malware
  • breeding grounds of peer-to-peer file sharing.

8
05 Clean Sweep Regularly declutter your system
www.infosectrain.com
learntorise
by removing unused programs. 06 Update
Everything Keep your computer programs up to
date to fix any holes that Trojans might use.
9
FOUND THIS USEFUL?
Get More Insights Through Our FREE Courses
Workshops eBooks Checklists Mock Tests
LIKE
SHARE
FOLLOW
Write a Comment
User Comments (0)
About PowerShow.com