Page 65 - KEC Khaitan C5 Flipbook
P. 65

TROJAN HORSE

                 Trojan horse or Horse conceals itself inside the software that seems legitimate. It has the
                 ability to cause serious damage when they enter the computer. Once installed, they allow
                 unauthorised access to the computer making it easier for it to be remotely controlled by
                 someone else. This may lead to loss of personal data and confidential information.





                         uiz   Bee        Which type of malware spreads on its own?
                                          ______________________________________________________





                 How Do Trojan Horses Work?
                 They are received as an e-mail attachment from someone we know and appear legitimate.
                 Once you click the attachment, download and install it, the malware also gets installed

                 into the computer.

                 Effects of Trojan Horse
                 Like viruses and worms, they may             Where does the Trojan Horse get its name

                 destroy  the  data  and  affect  the         from?
                 performance of the computer.

                 RANSOMWARE

                 Ransom is the money demanded  to  release the hostage  kidnapped  for  the purpose.
                 Similarly, ransomware is malicious software used to access the data of the host system
                 illegally by encrypting it. The victim of the host system has to pay a huge amount of money

                 to the attacker to get back access to data.



                           HOW CAN WE PROTECT OUR COMPUTERS?


                   Install an antivirus program and ensure that it is updated timely.
                    Never allow any CD, DVD or pen drive brought from an untrusted source to be used directly

                   on the computer without scanning for viruses.
                   Never open e-mail attachments received from strangers.
                    Make sure the software on your computer is updated, including the operating system
                   and browsers.

                   Use the original operating system.
                   Do not download music, program or games from unknown sources on the Internet.







                                                                                         E-mail and Malware Safety  63
   60   61   62   63   64   65   66   67   68   69   70