Page 95 - IT_V5.0_Class7
P. 95
Trojan Horse
A Trojan Horse is a type of malware that enters your computer as a hidden program attached to
a harmless file. It is most of the time disguised as useful software to gain systematic entry to your
computer. It can steal the data, manage, or change the data by itself. It can cause several harmful
actions like data deletion, data modification, data copying, and interfering in the operation of
computers or computer networks. Unlike worms, Trojans do not self-replicate.
For example, a backdoor Trojan allows an attacker to acquire remote access to control a computer
for uploading, downloading, or executing data as and when needed.
ANTIVIRUS
Antivirus software is a program designed
to prevent, detect, and remove malicious
programs from the computer. After you install
the antivirus software, it runs automatically
in the background to provide real-time
protection against virus attacks. You should
also run full system scans periodically. Some
examples of antivirus software are McAfee, Norton McAfee Quick Heal
Norton, Quick Heal, etc.
Windows Defender is the antivirus software that’s included in the Windows operating system
that protects your device from viruses and other malware and threats.
List of jobs that an antivirus can do:
Scans for new or unknown threats based on behavior.
Blocks malicious files or websites to prevent infections.
Removes detected malware to avoid further damage.
Requires regular updates to detect new viruses.
PROTECTING YOUR DATA ON INTERNET
Data protection means keeping your data safe from harm or unauthorised access. It's important
to follow precautions and adjust settings to protect your computer. Some of the important
points to safeguard your data are:
Use Strong Passwords: Create passwords with a mix of uppercase, lowercase, numbers, and
special characters to prevent unauthorized access.
Install Antivirus and Firewalls: Antivirus and firewalls block harmful data and alert you to
remove malicious files, protecting your computer and data.
Encrypt Your Data: Encryption converts data into a secure, unreadable form, safeguarding
sensitive information from unauthorized access.
Use Secure Websites: Check for “https://” and a lock symbol to ensure the site is secure,
especially for online transactions.
Cyber Security 93

