1,594
6
Essay, 4 pages (850 words)

Essay on trojan virus

Trojan Virus

A Trojan virus is a malware that performs malicious functions under the pretext of a desired action, and it can harm the computer or compromise security.
At present, inventors of Trojans continue to release new variants, in order to see the virus remains ahead of detection and retain its continual grip on computers with the malware. Sinowal Trojan is among the most recent Trojans. Sinowal poses solemn threats to every person with an internet connection since it works secretly through a common infection scheme called drive-by downloads (Shiels, 2008). Internet users obtain the infection without recognition when they open a website that contains the Sinowal malicious code. The reason as to why Sinowal poses serious threat is because the Trojan can exist in a computer system for a long time, collecting and storing information. Several financial institutions in UK, Poland, US and Australia have reported cases of credit and debit cards being compromised by this malware. Security firms advise PC owners to scan their systems for malicious software, regularly, and update their anti-virus programs, frequently. In addition to using security soft ware, users are advised to shun from clicking items on networks with high traffic including social networks.
Also, a new Trojan virus is threatening systems of Apple Mac. Users of Apple Mac have been cautioned that a new Trojan virus can infect their PCs and steal secret codes of services like online banking, Papal and Google. The new virus is said to be a dangerous strain of Flashback, which is a Trojan virus that became discovered last year. The malware seeks to take secret control of Macs through different methods. The malware capitalizes on Java vulnerabilities a software language usually employed by websites to convey interactive aspects, and necessitates no intervention from the user to thrive. In case, Java is not set up, or all its security areas are updated, the new modification, Flashback G, tries to ploy users into installing it through presenting a sham security certificate that seems as if it comes from Apple. Mostly, users get tricked, as they click on “ continue” without knowing that they are installing malicious software in their systems. Users of Mac who have earlier versions of OS X, may be at be at a higher risk of obtaining the new Trojan, since Java was integrated as a component of the installation parcel. Besides, the Trojan gets transmitted through infected web pages, which makes it too easy to obtain this infection. Once a user opens an infected web page, the malware compromises the system through downloading and installing it covertly, devoid of the user’s conscious. However, if the system is secured, it may be hard for the Trojan to find its way. The new Trojan is extremely sophisticated as it can scan networks and obtain passwords and usernames, which it stores and conveys to cyber criminals. According to estimates, almost 600, 000 Macs are infected by the new variant of Trojan, which is a strain of Flashback.

Trojan Mitigation

New threats of Trojan viruses can be mitigated through different ways, depending on the nature of the attack.
Mitigating Reconnaissance Trojan Attacks
First, a professional in network security can notice when a reconnaissance attack is ongoing through structured alarms that become activated when certain bounds like the amount of ICMP requests in each second become surpassed.
A range of tools and technologies can be employed to monitor this action and produce an alarm. For instance, the Adaptive Security Appliance (ASA) of Cisco can be used to monitor intrusion, through a detached gadget. Moreover, authentication may be executed, in order to guarantee proper access. Encryption may, also, be used, so as, to make packet sniffer attacks ineffective (Bidgoli, 2006). Use of anti-sniffer apparatus to discover packet sniffer attacks and controlled infrastructure can, also, help in detecting reconnaissance attack. Lastly, employing IPS and firewall and can restrict the quantity of data that can be revealed with a port scanner.

Mitigating DOS Trojan Attacks

Lastly, DOS Attacks can easily be established by the network security. A network consumption graph demonstrating unusual actions could designate a DoS attack. However, mitigating DoS attacks need vigilant diagnostics, preparation, and collaboration from Internet Service Providers (ISPs), in order to establish when a DoS attack is happening. The entire process must, also, be supported by policies on network security. Other mitigation procedures for DOS attacks include use of the antispoofing technologies, establishment of Intrusion prevention systems (IPS) and firewalls as well as, use of traffic policing (Bhaiji, 2008).

Mitigating Access Trojan Attacks

A professional in network security can detect any access attacks through evaluating bandwidth utilization, logs and procedure loads. The policy on network security ought to spell out that logs become formally maintained, for every server and network device. A network security professional can establish whether an unusual amount of failed login attempts has happened, through reviewing logs. Other procedures for mitigating access attacks include ensuring that there is a strong password security, use of cryptography and using application patches and operating systems.
In conclusion, it is possible to mitigate new threats of Trojan Virus, although such mitigation requires competent network security policies and personnel.

References

Bhaiji, Y. (2008). Network security technologies and solutions. Indianapolis, IN: Cisco Press.
Bidgoli, H. (2006). Handbook of information security. Hoboken, N. J.: John Wiley.
Shiels, M. (2008, October 31). Trojan virus steals banking info. BBC News. Retrieved from http://news. bbc. co. uk/2/hi/7701227. stm.

Thank's for Your Vote!
Essay on trojan virus. Page 1
Essay on trojan virus. Page 2
Essay on trojan virus. Page 3
Essay on trojan virus. Page 4
Essay on trojan virus. Page 5

This work, titled "Essay on trojan virus" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Essay on trojan virus'. 9 March.

Reference

AssignBuster. (2022, March 9). Essay on trojan virus. Retrieved from https://assignbuster.com/essay-on-trojan-virus/

References

AssignBuster. 2022. "Essay on trojan virus." March 9, 2022. https://assignbuster.com/essay-on-trojan-virus/.

1. AssignBuster. "Essay on trojan virus." March 9, 2022. https://assignbuster.com/essay-on-trojan-virus/.


Bibliography


AssignBuster. "Essay on trojan virus." March 9, 2022. https://assignbuster.com/essay-on-trojan-virus/.

Work Cited

"Essay on trojan virus." AssignBuster, 9 Mar. 2022, assignbuster.com/essay-on-trojan-virus/.

Get in Touch

Please, let us know if you have any ideas on improving Essay on trojan virus, or our service. We will be happy to hear what you think: [email protected]