Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans

A Trojan horse is a computer program that contains malicious code designed to mislead users of their true intent. The malicious code is injected into legitimate software applications to allow a hacker to take control of an infected computer. It attacks computer systems by disguising itself as a familiar or legitimate system. The first reporting of the malware that has characteristics resembling a trojan description was made in 1975, and John Walker developed it. However, the first and official trojan horse malware was created by Ken Thompson in the early 1980s.

The trojan horse acts as a linking mechanism to the hacker, and once clicked, any data can be transferred or hacked into computers. When a user clicks a trojan, they open a loophole or backdoor into their computers which the attacker can exploit to conduct cybercrime or worse atrocities (Sajeed et al., 2017). Trojans are also famous for redirecting users to advertisements sites and unknown or illegal sites like pornography sites. Once a Trojan is installed on a computer system, criminals can use it to steal, spy, and gain unauthorized access to sensitive data on any computer.

To protect against trojans, computer users are expected to undertake several initiatives. The first step is to install and run an always up-to-date internet security suite. Furthermore, the users need to ensure that they constantly update their operating systems to help close up security loopholes that trojans can take advantage of. The users can also install firewalls to monitor network traffic and provide protection against trojan infection. Most importantly, users should always install software from legitimate sources. While browsing the internet, users should be careful about the links they click and the email attachments they download.

The future of hackers is hugely based on new technologies such as artificial intelligence and machine learning to design smart trojans. There have been many technological advancements for detection and better ways to warn computer users against such malware. Multilayered protection systems are also used to protect computer systems from being hacked into a Trojan; therefore, Trojan installers will soon have to advance or be cut from this manipulation. In conclusion, trojans act as legitimate software but have malicious code that can be used as a backdoor into any computer system.

Reference

Sajeed, S., Minshull, C., Jain, N., & Makarov, V. (2017). Invisible Trojan-horse attack. Scientific Reports, 7(1), 1-7. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2023, May 5). Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans. https://studycorgi.com/trojan-horse-trojan-horse-attack-and-how-to-protect-against-trojans/

Work Cited

"Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans." StudyCorgi, 5 May 2023, studycorgi.com/trojan-horse-trojan-horse-attack-and-how-to-protect-against-trojans/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2023) 'Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans'. 5 May.

1. StudyCorgi. "Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans." May 5, 2023. https://studycorgi.com/trojan-horse-trojan-horse-attack-and-how-to-protect-against-trojans/.


Bibliography


StudyCorgi. "Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans." May 5, 2023. https://studycorgi.com/trojan-horse-trojan-horse-attack-and-how-to-protect-against-trojans/.

References

StudyCorgi. 2023. "Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans." May 5, 2023. https://studycorgi.com/trojan-horse-trojan-horse-attack-and-how-to-protect-against-trojans/.

This paper, “Trojan Horse: Trojan-Horse Attack and How to Protect against Trojans”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.