Page 87 - 2606_PlugGPT_C5_Flipbook
P. 87

How Do Trojan Horses Work?
                 They are received as an e-mail attachment from someone we know and appear legitimate.

                 Once you click the attachment, download and install it, the malware also gets installed
                 into the computer.

                 Effects of Trojan Horse

                 Like viruses and worms, they may destroy the data and affect the performance of the
                 computer.



                                        Where does the Trojan Horse get its name from?



                 RANSOMWARE
                 Ransom is the money demanded  to  release the hostage  kidnapped  for  the purpose.

                 Similarly, ransomware is malicious software used to access the data of the host system
                 illegally by encrypting it. The victim of the host system has to pay a huge amount of money
                 to the attacker to get back access to data.





                         uiz   Bee        Which type of malware spreads on its own?
                                          ______________________________________________________








                           HOW CAN WE PROTECT OUR COMPUTERS?

                   Install an antivirus program and ensure that it is updated timely.

                    Never allow any CD, DVD or pen drive brought from an untrusted source to be used directly
                   on the computer without scanning for viruses.
                   Never open e-mail attachments received from strangers.
                    Make sure the software on your computer is updated, including the operating system
                   and browsers.

                   Use the original operating system.

                   Do not download music, program or games from unknown sources on the Internet.


                                   What if you could design an impenetrable cyber fortress to protect your

                                   computer from hackers? What features would it have and how would you
                                   use technology to build it?





                                                                                         E-mail and Malware Safety  85
   82   83   84   85   86   87   88   89   90   91   92