Page 108 - IT_V5.0_Class8
P. 108
Trojan Horse
A Trojan Horse is a type of malware that enters your computer as a hidden program attached to
a harmless file. It is most of the time disguised as useful software to gain systematic entry to your
computer. It can steal the data, manage, or change the data by itself. It can cause several harmful
actions like data deletion, data modification, data copying, and interfering in the operation of
computers or computer networks. Unlike worms, Trojans do not self-replicate.
For example, a backdoor Trojan allows an attacker to acquire remote access to control a computer
for uploading, downloading, or executing data as and when needed.
Boost Bits
The term “Trojan Horse” originates from Greek mythology, referring to the Wooden Horse
used by the Greeks to enter the city of Troy and win the Trojan War.
ANTIVIRUS
Antivirus software is a program designed to prevent, detect, and remove malicious programs
from the computer. After you install the antivirus software, it runs automatically in the
background to provide real-time protection against virus attacks. You should also run full
system scans periodically. Some examples of antivirus software are McAfee, Norton, Quick
Heal, etc.
Norton McAfee Quick Heal
Windows Defender is the antivirus software that’s included in the Windows operating system
that protects your device from viruses and other malware and threats.
List of jobs that an antivirus can do:
Scans for new or unknown threats based on behavior.
Blocks malicious files or websites to prevent infections.
Removes detected malware to avoid further damage.
Requires regular updates to detect new viruses.
Offers extra features like firewall, web protection, email scanning, password managers, and
parental controls.
106 Information Technology (V5.0)-VIII

