ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Impact of ict on society virus
Impact of ict on society virus
Impact of ict on society virus
Types of Trojan horse payloads
  Trojan horse payloads are almost always designed to do various harmful
  things, but could be harmless. They are broken down in classification
  based on how they breach systems and the damage they cause.
? The seven main types of Trojan horse payloads are:
  1. Remote Access (designed to provied the attacker with complete
     control of the victim¡®s system)
  2. Data Destructive Email Sending (designed to destroy and delete files)
  3. Downloader (download manager for Microsoft Windows)
  4. Proxy Trojan (disguising others as the infected computer)
  5. FTP Trojan (adding or copying data from the infected computer)
  6. Security software disabler (designed stop or kill security programs such
     as antivirus program or firewall without the user knowing)
  7. URL Trojan (directing the infected computer to only connect to the
     internet via an expensive dial-up connection)
Impact of ict on society virus
Impact of ict on society virus
?   http://www.iriscan.com/basic.htm
?   http://www.i.are.talk.com/htm
?   http://www.slideshare.com/htm
?   http://www.slideshare.nets/htm
Impact of ict on society virus

More Related Content

Impact of ict on society virus

  • 4. Types of Trojan horse payloads Trojan horse payloads are almost always designed to do various harmful things, but could be harmless. They are broken down in classification based on how they breach systems and the damage they cause. ? The seven main types of Trojan horse payloads are: 1. Remote Access (designed to provied the attacker with complete control of the victim¡®s system) 2. Data Destructive Email Sending (designed to destroy and delete files) 3. Downloader (download manager for Microsoft Windows) 4. Proxy Trojan (disguising others as the infected computer) 5. FTP Trojan (adding or copying data from the infected computer) 6. Security software disabler (designed stop or kill security programs such as antivirus program or firewall without the user knowing) 7. URL Trojan (directing the infected computer to only connect to the internet via an expensive dial-up connection)
  • 7. ? http://www.iriscan.com/basic.htm ? http://www.i.are.talk.com/htm ? http://www.slideshare.com/htm ? http://www.slideshare.nets/htm