logo

Trojan Horse Attack

   

Added on  2022-12-09

11 Pages2804 Words324 Views
TROJAN HORSE ATTACK 0
Trojan Horse Attack

TROJAN HORSE ATTACK 1
Table of Contents
Introduction.....................................................................................................2
Analysis of Trojan horse attack.......................................................................2
Key factors governing the cyber threat.......................................................2
Working process of Trojan horse attack......................................................2
Awareness regarding the attack..................................................................3
Impacts of the Trojan horse attack..............................................................3
Case study based on Trojan horse attack.......................................................4
GBC system hit with Trojan horse attack.....................................................4
Impact of the attack.....................................................................................4
Working of the attack...................................................................................5
Prevention techniques used by GBC............................................................5
Defenses measures against the cyber attack..................................................5
Preventive measures against the Trojan attack...........................................5
Effectiveness of the adopted methods against Trojan horse.......................6
Limitations of the current defenses.............................................................6
Strategy to strengthen the defense again the attack...................................7
Conclusion.......................................................................................................7
References.......................................................................................................8

TROJAN HORSE ATTACK 2
Introduction
The term Trojan horse is a kind of malware which is often camouflaged as
genuine computing software. Trojans may be employed by malware
software and criminals can easily access the personal data of the users. In
this generation, the rate of Trojan horse is growing rapidly and many
companies are suffering from such security threats while using computing
networks and systems (Lucamarini, et al., 2015). The significance of this
article is to examine the key aspects of the Trojan horse attack and evaluate
the recent attacks of Trojan horse on the user’s systems. With the help of
unwanted signals and unauthentic networks, hackers can perform Trojan
horses in the companies and access the sensitive data of the consumers.
This research paper will involve numerous sections for example; analysis of
Trojan horse, case study based on the Trojan and prevention techniques.
Analysis of Trojan horse attack
Key factors governing the cyber threat
Trojan horse is a common security attack faced by the companies which are
able to help the hackers for accessing the private details of the consumers
without taking their permission. It is identified that there are major three
key factors that produce cyber threats and issues in the workplace, for
example, lack of privacy, the involvement of unauthentic networks and
misconfiguration of the networks or systems used by the companies (Jain, et
al., 2014). With the help of unauthentic networks and fraud signals, the
hackers can perform Trojan horse and malware activities in the computing
systems. It is identified that most of the hackers use malicious software and
botnet process in order to produce traffic signals and block the
communication channels used by the companies.

TROJAN HORSE ATTACK 3
Working process of Trojan horse
It is observed that the Trojan is a part of malware which is mainly
developed by the attackers in order to disguise as legitimate software for
gaining access to target consumer networks (Jain, et al., 2014). The working
process of the Trojan horse contains malicious programs and unauthentic
networks for blocking the computing networks used by the companies. Once
malicious programs are installed in the computing system, the program will
infect other connected devices and data files throughout the user’s system
and the hackers are able to reduce the performance of computing devices
used by the companies. Moreover, the hackers transfer sensitive
information and traffic signals to the main server using internet connections
and collect the account related information without taking the permission of
the consumers (Yang, Sun, and Zhao, 2015). Therefore, it is stated that
using malicious software and unauthentic networks the hackers can conduct
the Trojan horse attack in the companies.
Awareness regarding the attack
Trojan horse is a common security attack that directly impacts on the
computer devices and networks used by the companies and help the
hackers for performing data breach. Consumers use only secured networks
and web servers while accessing computing software and accounts because
the hackers use unauthorized networks for detecting the personal
information (Wei, and Potkonjak, 2013). Moreover, the employees should
aware of the cyber-security attacks and malware signals while using
computing devices and software. It is identified that the misconfiguration of
networks is a key factor that helps the attackers for performing malware
activities in the business communities (Bhunia, et al., 2014). Therefore, it is
suggested that the developers should aware that the proper configuration
processes are used and users should use only secured networks and avoid
utilizations of third party applications in order to reduce the rate of
malware signals from the systems.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Cybersecurity Threat Name of the Student
|11
|2321
|49

Cyber Security Assignment PDF
|9
|2867
|2114

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Malicious Software Protection Policy
|6
|1728
|181

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61