3
Most read
TROJAN HORSE
BY :
RAKSHITHA . U
CSE ‘ B’
SOURCE COORDINATOR :
SANTHOSH SIR
WHAT IS TORJAN VIRUS ?
 A Trojan (often referred to as a Trojan virus) is a type
of malware that hides within a legitimate file or
program to gain access to your device.
 Because Trojan malware is delivered inside a
legitimate app or file, it’s very difficult to detect.
 Trojans are used to spy on victims, steal data, infect
other programs, and inflict other harm.
Legend has it that the greeks won
the trojan war by hiding in a
huge ,hallowed out horse that was
given as a gift to the city of troy .they
were then able to sneak in without
anyone knowing and then captured
the city and won their war
Like wise this program sneaks in with
another downloaded file and gives out
your information without you knowing it
ever happened.
how trojan works ?

What TORJAN does
 Deletes data
 Blocks data
 Modifies existing data
 Copies data
 Disrupts the performance of computer and networks
Different types of Trojan horse
 Remote access trojans : It is designed to provide the attacker with
complete control of the victim’s system.
 Data sending trojans : It is designed to provide the attacker with sensitive
data such as passwords ,credit card information …
 Downloader trojan : the main purpose of these trojans are to download
additional content onto the infected computer such as additional pieces
of malware
 Ransomware trojans : encrypts file and demands a ransom in exchange for
the decryption key .
j
How to stay protected ?
• Never download or install software from a source you
don’t trust completely.
• Never open an attachment or run a program sent to
you in an email from someone you don’t know.
• Keep all software on your computer up to date with
the latest patches.
• Make sure a Trojan antivirus is installed and running
on your computer.
• Download apps and software from official sources.
• Don’t click web banners or unfamiliar links.
• Update your operating system from time to time to
patch it against all security loopholes.
Thank you
.

More Related Content

PPTX
Trojan Virus.pptx
DOCX
trojon horse Seminar report
DOCX
Case study
PPTX
How to Protect your PC from Malware
PPTX
Atul trojan horse ppt 101
PPTX
Types of Malwares, Information security.
PPTX
MALWARE / VIRUS AND WORMS CHARACTERISTICS
PPTX
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
Trojan Virus.pptx
trojon horse Seminar report
Case study
How to Protect your PC from Malware
Atul trojan horse ppt 101
Types of Malwares, Information security.
MALWARE / VIRUS AND WORMS CHARACTERISTICS
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...

Similar to TROJAN HORSE ATTACK Presentation in cyber security (1).pptx (20)

PPTX
All about computer malwares
PPTX
Computer Security
PPTX
TROJAN HORSE.pptx
PPTX
Computer virus
PPT
Trojan horse nitish nagar
PPTX
trojan horse- malware(virus)
PPTX
Torjan horse virus
PPT
Trojan Horse Virus
PPTX
What is a Malware - Kloudlearn
PPTX
Trojan horse
PDF
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
PDF
trojan virus.pdf
PDF
Trojan Viruses.pdf
PDF
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
PDF
Trojan Viruses
PPTX
PPTX
Malware ppt
PPTX
Ppt123
PPTX
ETHICAL HACKING TROJAN TOPIC CSE DEPT.pptx
PPT
Trojan horse
All about computer malwares
Computer Security
TROJAN HORSE.pptx
Computer virus
Trojan horse nitish nagar
trojan horse- malware(virus)
Torjan horse virus
Trojan Horse Virus
What is a Malware - Kloudlearn
Trojan horse
A Trojan virus is a type of malware that disguises itself as a legitimate fil...
trojan virus.pdf
Trojan Viruses.pdf
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan Viruses
Malware ppt
Ppt123
ETHICAL HACKING TROJAN TOPIC CSE DEPT.pptx
Trojan horse
Ad

Recently uploaded (20)

PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Empowerment Technology for Senior High School Guide
PPTX
Computer Architecture Input Output Memory.pptx
PDF
semiconductor packaging in vlsi design fab
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
IP : I ; Unit I : Preformulation Studies
PPTX
Education and Perspectives of Education.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
Literature_Review_methods_ BRACU_MKT426 course material
Introduction to pro and eukaryotes and differences.pptx
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Empowerment Technology for Senior High School Guide
Computer Architecture Input Output Memory.pptx
semiconductor packaging in vlsi design fab
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
CRP102_SAGALASSOS_Final_Projects_2025.pdf
IP : I ; Unit I : Preformulation Studies
Education and Perspectives of Education.pptx
HVAC Specification 2024 according to central public works department
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Cambridge-Practice-Tests-for-IELTS-12.docx
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
Literature_Review_methods_ BRACU_MKT426 course material
Ad

TROJAN HORSE ATTACK Presentation in cyber security (1).pptx

  • 1. TROJAN HORSE BY : RAKSHITHA . U CSE ‘ B’ SOURCE COORDINATOR : SANTHOSH SIR
  • 2. WHAT IS TORJAN VIRUS ?  A Trojan (often referred to as a Trojan virus) is a type of malware that hides within a legitimate file or program to gain access to your device.  Because Trojan malware is delivered inside a legitimate app or file, it’s very difficult to detect.  Trojans are used to spy on victims, steal data, infect other programs, and inflict other harm.
  • 3. Legend has it that the greeks won the trojan war by hiding in a huge ,hallowed out horse that was given as a gift to the city of troy .they were then able to sneak in without anyone knowing and then captured the city and won their war Like wise this program sneaks in with another downloaded file and gives out your information without you knowing it ever happened.
  • 5. What TORJAN does  Deletes data  Blocks data  Modifies existing data  Copies data  Disrupts the performance of computer and networks
  • 6. Different types of Trojan horse  Remote access trojans : It is designed to provide the attacker with complete control of the victim’s system.  Data sending trojans : It is designed to provide the attacker with sensitive data such as passwords ,credit card information …  Downloader trojan : the main purpose of these trojans are to download additional content onto the infected computer such as additional pieces of malware  Ransomware trojans : encrypts file and demands a ransom in exchange for the decryption key .
  • 7. j
  • 8. How to stay protected ? • Never download or install software from a source you don’t trust completely. • Never open an attachment or run a program sent to you in an email from someone you don’t know. • Keep all software on your computer up to date with the latest patches. • Make sure a Trojan antivirus is installed and running on your computer. • Download apps and software from official sources. • Don’t click web banners or unfamiliar links. • Update your operating system from time to time to patch it against all security loopholes.