Computer Virus: Trojan Analysis and Mitigation Strategies Report

Verified

Added on  2022/08/20

|3
|517
|25
Report
AI Summary
This report analyzes the Trojan virus, a type of malware often disguised as legitimate software. It explores how Trojans can infect systems, including mobile devices, and the various ways they can be used by hackers, such as for data theft and identity theft. The report emphasizes the importance of mitigation strategies like regular system updates, using firewalls, and employing legitimate anti-virus software. It also highlights the significance of data backup and encryption to protect against the impact of a Trojan virus. The report references several sources to support its analysis, providing a comprehensive overview of the topic.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTER VIRUS
COMPUTER VIRUS
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COMPUTER VIRUS
Trojan Virus:-
A Trojan is a kind of virus that is frequently concealing as authentic software. This virus
can be working by cyber-thieves and cyber attackers trying to hacks the cyber systems. A
specific form of social skills characteristically cheats operators into executing and loading.
Trojans aren't harming only desktop computers or laptops. A Trojan comes devoted to what
looks like a good program. It is a false description of the application, loaded up with malware
(Simon, 2015). This virus can also affect user's mobile devices, counting tablets or cell phones.
Usually, this virus is recognizing by most anti-virus software and does not damage the
processor without it are implemented. Also, the user does not imitate but can come involved in a
virus that can distribute to another processor through the network. This virus can have several
usages, which be subject to the influences of the hacker (Bhattacharyya & Chakraborty, 2018).
These could be data theft, identity theft, crashing computers, tracing user actions, etc.
Mitigation Strategy:-
The daily system up-gradation process is an advantageous strategy to mitigate the Trojan
attacks. The user also protects their Internet connection properly and keep a firewall up. A
firewall supports to defend the computer from several threats, including hateful web traffic
(Hurier et al., 2017). The user must use anti-virus, which is authentic and legitimate. If the user is
receiving some spams mail or blank message through the email, then they must not open this
email. When the user opens this mail, then they must be affected by this type of virus. If the user
computer is concerned with a virus, then systematic data backup supports to reestablish user
data. It is practical to encrypt every evidence if it is lost. The data backup process is the
substantial probability of being protected by the computer.
Document Page
2COMPUTER VIRUS
References:-
Bhattacharyya, D., & Chakraborty, S. (2018). Chloroplast: the Trojan horse in plant–virus
interaction. Molecular plant pathology, 19(2), 504-518.
Hurier, M., Suarez-Tangil, G., Dash, S.K., Bissyandé, T.F., Le Traon, Y., Klein, J. and
Cavallaro, L., 2017, May. Euphony: Harmonious unification of cacophonous anti-virus
vendor labels for Android malware. In 2017 IEEE/ACM 14th International Conference
on Mining Software Repositories (MSR) (pp. 425-435). IEEE.
Simon, J. (2015, April). Digital tablets: a Trojan virus for IT in education?. In The Asian
Conference on Technology in the Classroom.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]