UNDERSTANDING MALWARE AND EVERYTHING ELSE ABOUT IT [PART 4]: TROJAN ||SIZ EDUCATION|| CLUB75

in Steem Infinity Zone3 years ago

10% to SIZ-Official

Screenshot_20220412-101803.pngdesigned in canva

Hello everyone🤗
Let me welcome you to the Part 4 of "Understanding malware and everything else about it"
You can click on any of the link below to read and understand what was discussed in the previous lessons
Understanding malware and everything else about it. Part1
Understanding malware and everything else about it:VIRUS.Part 2
Understanding malware and everything else about it:WORM.Part 3


So,today we will be discussing TROJAN as a form of malware.
Recall that in our last lesson,we talked about worm and the previous one before the last,we talked about virus.

Moving on today,we shall be exploring and gaining some more understanding about the Trojan as a form of malware.
Our area of concentration on today's lesson about Trojan will be on

•What is Trojan
•How does it work
•Types of Trojan
•How to protect your computer from Trojan

Please stay with me.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

WHAT IS TROJAN

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220412-103102.pngimage from Istock

Trojan just like every other malwares such as virus and worm are malicious software that disguises as legitimate program or file online which is extremely dangerous and can disrupt a system,network or computer.

They are software program designed by cybercriminals with the only purpose and main objective of wrecking havoc in a system or network where it gain access into.

The Trojan is capable of damaging, deleting, stealing and disrupting files and documents in a whole system or network once it manage to instill itself in the computer or system.

It is often difficult to know a file or application containing Trojan horse or virus from a legit file or application online because it disguise itself as a bona fide document or appliancation whereby tricking users to download and install it on their device.

Once the app or file is downloaded or the link is cliked,this automatically means that the Trojan malicious code has been installed and it has also succeeded in executing t codes on the device and it can now begin to carry out the function of which it was designed for, causing damage!

The Trojan is referred to by many as Trojan horse or sometimes Trojan virus but factually speaking,none of this title is applicable to it.
This is because,virus can execute itself and also replicate or disseminate itself in a system or network while Trojan cannot.
Trojan depend on the user for it code execution process and operation.

Nevertheless,that isn't of Paramount importance right now,wether your prefer Calling it Trojan horse or Trojan virus,it is only important that we know how Trojan works and operate.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

HOW DOES TROJAN WORKS

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220412-103439.pngimage from Istock

Think of Trojan as an impersonating software program,files,apps or document that disguises as legitimate document or file to be downloaded,open or clicked on because that is it operating mechanism.

Most times,they come in form of emails message with attachment directly from cybercriminals which will encourage the user to click on certain link in order to view the content in the attachment.

This link is a trap and once a user falls for the bait by clicking unknown link on email, downloading parody app unknowingly,opening and downloading files which contain this Trojan virus ignorantly,the trojan will quickly install itself in the system or computer.

And as soon as it installs itself In the computer and start to execute it codes,the malware will begin to disseminate into other files in your computer and in turn damage the whole system.

The function of Trojan in a system or computer varies as they are designed to perform different distructive operation in an infected computer,but trust me,you don't want to experience any of them.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

TYPES OF TROJAN

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220412-103756.pngimage from Istock

Just as Trojan is a form of malware,we also have some some subdivision of TROJAN too.
These are some of the types of Trojan horse or virus and what they do in a system, network or computer.

•BACKDOOR TROJAN

The backdoor Trojan is a type of Trojan that create a kind of "backdoor" in a computer or system whereby giving access to a remote user to gain access into your computer,steal files,download them and even Install other malwares into one's system.

•DISRTIBUTED DENIAL OF SERVICE(DDoS) ATTACK TROJAN.

This trojan major function is to perpetuate or carry our DDoS attack on a network.
It purpose is to take down a network by causing and flooding the entire network with extreme traffic.
This traffic is caused by users infected computers.

•DOWNLOADER TROJAN

The downloader Trojan is a kind of Trojan that Target and attack already vulnerable and infected computers,whereby installing a new and updated version of the malware into the already infected computer again.

•FAKE AV TROJAN

This Trojan disguises as an antivirus program or software but it demands money from user to detect and remove virus from computer or system of which this virus might not even exist in the computer.

•TROJAN IM

This type of Trojan target instant messages to perpetuate and execute it codes.
They are designed to steal users logins and passwords.
Aside this,they also perform other atrocious activities.

•TROJAN BANKER

The Trojan banker targets users finance and financial accounts.
it is designed to keep track of one's financial activity and transaction online which includes paying bills,banking online etc and inturn steal financial account information.

•REMOTE ACCESS TROJAN

This type of Trojan is a bit similar to backdoor Trojan,but in this case,the Trojan gives full access and control of a computer to a remote user, putting them in control over your computer via a remote connection.

it can be use to steal files on the computer and also spy on a user.

•RANSOM TROJAN

The Ransome trojan attack a computer and inturn demand ransom from the user to undo and release the data back.
It work by blocking or preventing the user from gaining access to data in the computer or even impairing the performance of the user's computer.

•INFOSTEALER TROJAN & MAILFINDER TROJAN.

Just like both Trojan name imply,they are designed to steal info on a computer and also email address accumulated by a user over time in a computer.

•GAME-THIEF TROJAN

This Trojan target online gamers as it is designed to steal their gaming account information.

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

HOW TO PROTECT YOUR COMPUTER AGAINST TROJAN

C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iQSSQYkNupMyERjV5hC25Q8j8CSLsEb4D2gNMXTjb7aTMfxpmv2gsQH4skdUedaDEbrSKxxQ8P8-1.png

Screenshot_20220412-104139.pngimage from Istock

Trojan does not only attack laptops or desktops,mobile smartphones are also susceptible to their attack.
Here In this part of the lesson,I will be highlightening some ways to protect your device against Trojan.

•The first precaution and security measure on any device against any form of malware is the Installation and running of a trusted and certified security suite(antivirus) on the device.
You don't want your computer or system to be susceptible to attack then an antivirus must be in place as this devices are prone to cyber attacks.

•Ensure to always scan your device periodically with a security software or app and also make it carry out the scanning diagnosis automatically at interval.

•Always ensure to keep your computer or phone updated everytime a new version of update is ready as these cybercriminals make sure to bank on the loophole of phone being outdated to launch their attack.

•Keep your computer and account secure by making use of complex password which contains letters,numbers and even signs or symbol just to make it unique and complex to guess.

•Make use of firewalls for your computer to keep your information safe and secure.

•Ensure to always replicate and make extra copy of your information on your computer or phone
Always backup information on your computer so as to easily access them if unfortunately your computer gets Infected with Trojan.

•Always take your time before clicking on any email attachment,make sure to always scan the email before opening or clicking any link.

•Avoid visiting unnamed and unsafe website as most of this website is an host to several Trojan horse.

•Be cautious of program,apps and software online and do not download them if you are unsure of the source or have reservation about the application or software,this is because Trojan disguise and impersonate legitimate app and software online.

•Avoid clicking on pop up windows that appear on your computer as they will always redirect you to unsafe site where your device might end up getting Infected.


This is where I will be drawing the curtain on today's edition (part 4) of "UNDERSTANDING MALWARE AND EVERYTHING ELSE ABOUT IT"

See you in my next continuation post on SIZ EDUCATION here in @steem-infinity-zone .

I hope you learnt something new today😊
I'm glad you did.

Thanks for reading through.
Special thanks:@siz-official
@faran-nabeel.

Sort:  
 3 years ago 

Report,

SteemexclusiveYes
Bit BotNo
Club75Yes
PlagiarismNo
10 % to siz-officialYes
Your post has been successfully curated by our team via @nane15 at 50%. Thank you for your committed efforts, we invite you to do more and keep posting high quality posts for a chance to win valuable upvotes from our team of curators and probable selection for an additional upvote later this week in the Top Seven.

received_388032689541375-1.jpeg

Note: You must enter the tag #fintech among the first 4 tags for your post to be reviewed.

Coin Marketplace

STEEM 0.21
TRX 0.20
JST 0.033
BTC 94798.39
ETH 3128.70
USDT 1.00
SBD 3.04