Skip to content

CRMNUGGETS

RELIGION. DIGITAL MARKETING. PROJECT MANAGEMENT. ITIL 4 AND MORE

SEARCH THROUGH OUR POSTS

Menu
  • HOME
  • ABOUT US
  • CRM
  • CYBER SECURITY
  • DIGITAL MARKETING
    • ITIL 4
  • PROJECT MANAGEMENT
  • TERMS AND CONDITIONS
  • PRIVACY POLICY
  • CONTACT US
Menu
Unknown Facts About Trojan Horses

Unknown Facts About Trojan Horses

Posted on April 26, 2023

Unknown Facts About Trojan Horses

 

The term Trojan horse originated from Greek mythology. Greek warriors offered the people of Troy (the Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors.
At night, after most Trojans were asleep, the warriors burst out of the horse, opened the city gates, and allowed a sizeable force to enter and take over the city.
Trojan horse malware is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user that runs it. Often, Trojans are found attached to online games.
Users are commonly tricked into loading and executing the Trojan horse on their systems. While playing the game, the user will not notice a problem. In the background, the Trojan horse has been installed on the user’s system. The malicious code from the Trojan horse continues operating even after the game has been closed.
The Trojan horse concept is flexible. It can cause immediate damage, provide remote access to the system, or access through a back door. It can also perform actions as instructed remotely, such as “send me the password file once per week.” This tendency of malware to send data back to the cybercriminal highlights the need to monitor outbound traffic for attack indicators.
Custom-written Trojan horses, such as those with a specific target, are difficult to detect.
 

Trojan Horse Classification

this is the image’s alt text
DestroyEnable Remote AdministrationTransmit Password
Trojan horses are usually classified according to the damage that they cause, or the manner in which they breach a system, as shown in the figure.
Type of Trojan Horse Description
Remote-access Enables unauthorized remote access.
Data-sending Provides the threat actor with sensitive data, such as passwords.
Destructive Corrupts or deletes files.
Proxy Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.
FTP Enables unauthorized file transfer services on end devices.
Security software disabler Stops antivirus programs or firewalls from functioning.
Denial of Service (DoS) Slows or halts network activity.
Keylogger Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.
Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on an individual and corporate level, I will be very glad to do that because I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained include staff of Dangote Refinery, FCMB, Zenith Bank, and New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training. 

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

Fact Check Policy

CRMNUGGETS is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

     

Fact Check Policy
Contact Us

truehost
whatsapp

Related posts:

RCCG SOD Year One : Know Yourself. Part Two.RCCG SOD Year One : Know Yourself. Part Two. Unknown Facts About Marketing Communications In CRMUnknown Facts About Marketing Communications In CRM Customer Touchpoints In CRMUnderstanding Customer Touchpoints In CRM Customer Strategy vs CRM StrategyComparison Of Customer Strategy vs CRM Strategy Limitations Of Internet Marketing8 Major Limitations Of Internet Marketing 4 Impacts Of Internet On Businesses4 Impacts Of Internet On Businesses building your email marketing listTips For Building Your Email Marketing List  Analysing Blogging As Part Of Online MarketingAnalysing Blogging As Part Of Online Marketing Email Communication SecurityUnderstanding Email Communication Security Analysing The Evolution of Threat ActorsAnalysing The Evolution of Threat Actors Facts About Enterprise Patch ManagementFacts About Enterprise Patch Management

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

STAY UPDATED WHEN WE ROLL OUT NEW CONTENTS ON THIS BLOG

GET UPDATES WHEN WE POST NEW CONTENTS ON THIS BLOG

* indicates required

You may also like

RCCG SOD Year One : Know Yourself. Part Two.RCCG SOD Year One : Know Yourself. Part Two. Unknown Facts About Marketing Communications In CRMUnknown Facts About Marketing Communications In CRM Customer Touchpoints In CRMUnderstanding Customer Touchpoints In CRM Customer Strategy vs CRM StrategyComparison Of Customer Strategy vs CRM Strategy Limitations Of Internet Marketing8 Major Limitations Of Internet Marketing 4 Impacts Of Internet On Businesses4 Impacts Of Internet On Businesses building your email marketing listTips For Building Your Email Marketing List  Analysing Blogging As Part Of Online MarketingAnalysing Blogging As Part Of Online Marketing Email Communication SecurityUnderstanding Email Communication Security Analysing The Evolution of Threat ActorsAnalysing The Evolution of Threat Actors Facts About Enterprise Patch ManagementFacts About Enterprise Patch Management
©2023 CRMNUGGETS | Design: Newspaperly WordPress Theme