Trojan Virus Presented by Andy Lindberg & Denver Bohling.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Roman Schlegel City University of Hong Kong Kehuan Zhang Xiaoyong Zhou Mehool Intwala Apu Kapadia XiaoFeng Wang Indiana University Bloomington NDSS SYMPOSIUM.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses, Worms & Trojan Horses
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
What is a Trojan Horse Virus? It is a program that is downloaded usually with a music or move file. They usually will erase memory, send credit card #s.
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Unit 19 INTERNET SECURITY
Staying Safe Online Keep your Information Secure.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Trojan Horses What you need to know about one of the world’s most dangerous forms of malicious code.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Mobile Device Security Threats Christina Blakley Host Computer Security.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Android and IOS Permissions Why are they here and what do they want from me?
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
How To Remove Flooders?-Get Help Website:
Facebook privacy policy
An Introduction to Phishing and Viruses
COMPUTER VIRUSES Computer Technology.
The Internet of Unsecure Things
How to keep the bad guys out and your data safe
Introduction-Cyber Safety
Presentation transcript:

Trojan Virus Presented by Andy Lindberg & Denver Bohling

Trojan War

What is a Trojan Virus? Software that disguises itself as something helpful and safe Not actually a virus Doesn’t replicate itself Usually performs background processes that are usually harmful (depending on the functional purpose of the Trojan)

Types of Trojans Remote Access Trojan Gives attacker complete control Access to the file system Password Sending Trojan Searches cached passwords watches for new ones to be entered to send that info to a target host

Types of Trojans Keylogger Trojan Records the users key strokes Destructive Trojan Deletes files from the system Denial of Service (DoS) Trojan Floods the internet traffic on the users computer

Types of Trojans File Transfer Protocol (FTP) Trojan Opens up a port to allow an attacker to make an FTP connection with the infected computer Hybrid Trojans

The Future of Trojans “Computer viruses are now airborne, infecting mobile phones in every part of the globe. Security companies, cellular operators and phone makers are moving to quash these threats before they spiral out of control.” – Mikko Hyyponen

Trojans & Mobile Phones First rogue program created in 2003 Did nothing but drain the battery of the phone Tried to spread itself through Bluetooth connections Smartphone applications & third party app stores As of 2006, 70% of Smartphones ran on a Symbian based operating system Many viruses are designed for this kind of system

Trojans & Mobile Phones “ Soundminer ” Developed by researchers from City University of Hong Kong Required a small amount of permissions (no internet, etc.) Recorded credit card information By keypad typing By voice Encodes the collected data In form of vibration setting

Trojans & Mobile Phones “ Deliverer ” Decodes the message from “Soundminer” Sends the decoded message to a remote server Vibration settings channel 87 bits 54 bits needed for credit card info

Prevention Mobile phones Mobile phone antivirus software is offered When downloading apps: Check permissions the app requires for use PC Update Antivirus software Check for unusual behavior Be careful of what you download

Sources Hypponen, Mikko. “Malware Goes Mobile”. Scientific American, INC. November April 16, Kiran.Kola, Mahathi. “Botnets:Overview and Case Study”. Mercy College April 16, Kirk, Jeremy. “Soundminer Trojan horse steals Android phone data”. IDG News Service. January 20, April 17, _phone_data. _phone_data “Malware History – Trojan Horses”. Malware City.com. August 11, April 18, “New Trojan Horse Attacks Android to Steal User’s Information”. Mobile Phone Lover. February 18, April 17, android-to-steal-users-information.html “Trojan Virus”. TopBits.com. August 5, April 16,