Page 108 - IT_V5.0_Class8
P. 108

Trojan Horse

                  A Trojan Horse is a type of malware that enters your computer as a hidden program attached to
                  a harmless file. It is most of the time disguised as useful software to gain systematic entry to your
                  computer. It can steal the data, manage, or change the data by itself. It can cause several harmful
                  actions like data deletion, data modification, data copying, and interfering in the operation of
                  computers or computer networks. Unlike worms, Trojans do not self-replicate.
                  For example, a backdoor Trojan allows an attacker to acquire remote access to control a computer
                  for uploading, downloading, or executing data as and when needed.
                         Boost Bits

                   The term “Trojan Horse” originates from Greek mythology, referring to the Wooden Horse
                   used by the Greeks to enter the city of Troy and win the Trojan War.



                     ANTIVIRUS

                  Antivirus software is a program designed to prevent, detect, and remove malicious programs
                  from the computer. After you install the antivirus software, it runs automatically in the
                  background  to  provide  real-time  protection  against  virus  attacks.  You  should  also  run  full
                  system scans periodically. Some examples of antivirus software are McAfee, Norton, Quick
                  Heal, etc.






















                                          Norton                 McAfee                Quick Heal
                  Windows Defender is the antivirus software that’s included in the Windows operating system
                  that protects your device from viruses and other malware and threats.

                  List of jobs that an antivirus can do:
                     Scans for new or unknown threats based on behavior.
                     Blocks malicious files or websites to prevent infections.
                     Removes detected malware to avoid further damage.
                     Requires regular updates to detect new viruses.

                     Offers extra features like firewall, web protection, email scanning, password managers, and
                     parental controls.





                   106    Information Technology (V5.0)-VIII
   103   104   105   106   107   108   109   110   111   112   113