|Assignment ID Number||AFFGEHU83939HD|
|Type of Document||Essay|
Malware-Trojan Horse Virus Case Study
Running head: MALWARE 1
Malware-Trojan horse virus
Malware can be defined as any file or program that is introduced to a computer with the intention of harming the user. The harm to the user can be through interfering with his use of the compute,
unauthorized access to his data, locking the user out of his computer and also spying on the user’s activity. There are several types of malware and they include ransom ware, Trojan horses, computer
viruses, worms and spyware (White, Fisch & Pooch, 2017). For this particular assignment, I will focus on Trojan horse virus. The name Trojan horse comes from the famous Greek story, where Greek soldiers were able to take down the city of Troy after they sneaked into the city inside a wooden horse that was guised as a gift to the people of Troy. Just like the story the Trojan horse virus disguises
itself as a legitimate program however the program provides unauthorized access into the system most of the time to hackers.
Most of the time, Trojan horses gain access to a secured system through social engineering. Most of the time, Trojan horse viruses are introduced into a system by duping a user into executing an
attachment on an email guised to be unsuspicious. They can also be introduced via social media where users are tricked into clicking on fake advertisements or advertisements that offer fake
rewards. Once the links or attachments are clicked on, a Trojan horse virus is introduced. Trojan horse viruses can allow an attacker to have access to a user’s personal information and other forms of
data. Trojan horse viruses can affect other devices on the network through infection caused by the introduction of the first Trojan horse; most ransom ware is introduced through Trojan horse viruses
(Wang, Lorch & Parno, 2016). In addition, through the use of Trojan horse viruses, attackers can modify data, copy data, block data, delete data and generally disrupt or distort the performance and
operations of targeted computers or devices in a network.
Steps of mitigating a Trojan horse virus attack
The first step in mitigating a Trojan horse virus attack is the installation of effective anti-malware software or what is commonly referred to as an anti-virus. The anti-malware will detect as well as
prevent any Trojan horse virus attack on a computer or a network. The second step in mitigating Trojan horse virus attacks is the installation of the latest available patches of the operating system in
use. The third step is proper scanning of all external devices that are introduced to a computer or a network (Rader & Rahman, 2015). The fourth step is through the cautioning on the execution of any
program that is not from a trusted source. The fifth step is the cautioning on the opening of email attachments from unknown senders especially attachments that have the extensions .vbs and .exe.
The final step or caution is to be alert on social media adverts especially those that offer rewards through clicking on links.
Rader, M., & Rahman, S. (2015). Exploring historical and emerging phishing techniques and mitigating the associated security risks. arXiv preprint arXiv:1512.00082.
Wang, J. H., Lorch, J. R., & Parno, B. J. (2016). U.S. Patent No. 9,230,100. Washington, DC: U.S. Patent and Trademark Office.
White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
Tired of getting an average grade in all your school assignments, projects, essays, and homework? Try us today for all your academic schoolwork needs. We are among the most trusted and recognized professional writing services in the market.
We provide unique, original and plagiarism-free high quality academic, homework, assignments and essay submissions for all our clients. At our company, we capitalize on producing A+ Grades for all our clients and also ensure that you have smooth academic progress in all your school term and semesters.
High-quality academic submissions, A 100% plagiarism-free submission, Meet even the most urgent deadlines, Provide our services to you at the most competitive rates in the market, Give you free revisions until you meet your desired grades and Provide you with 24/7 customer support service via calls or live chats.