English, asked by Sharmamahek, 6 months ago

2) Complete :
The Trojans would defend themselves by :​

Answers

Answered by QuestionAnswer9536
1

Answer:

Much like the Trojan Horse in Greek mythology, a Trojan Horse virus is a type of malware that infiltrates your computer in the disguise of a harmless file. It then lies in wait only to harm your PC and devices when you least expect it.

Most Trojans aim to take control of your computer and steal your sensitive data, while acting as a gateway to allow even more malware to infiltrate. So how do you quickly spot the telltale signs of a Trojan infection before it’s too late, while defending your PC and devices against these malicious attacks?

We’ll show you.

Quick List:

What do Trojans do?

Types of Trojan Horses

How to spot Trojans

Tips to Avoid Getting Infected

Protect yourself from Trojan Threats

Top 3 Antivirus Programs for Defending Against Trojans

Protect yourself from Trojan Threats Now!

What do Trojans do?

In a nutshell, each Trojan Horse is created with a specific job in mind, including any of the following:

Intercepting passwords and personal details to gain access to your accounts

Stealing bank details and credit card information

Gaining control of your computer network and corrupting/deleting files

Collecting personal information in order to hijack your identity

Exposing your most confidential details

Types of Trojan Horses

While Trojans are often labeled as viruses, this definition is not technically correct. A computer virus will attempt to spread the infection wherever possible, whereas a Trojan is an individual program with a specific task, such as any of the following:

A Rootkit

A rootkit works by undermining your computer’s system activities. It allows malware to run undetected, to increase the length of time and amount of damage that can be achieved by one infection.

A Backdoor

A Backdoor Trojan grants complete remote control to the operator, allowing them to edit, send, download and delete files. They are often used to hijack personal devices for criminal activity.

An Exploit

Exploits work by taking advantage of a security loophole within your computer software. Whether in a specific app or affecting the operating system itself, they can manipulate a vulnerability to gain direct access to your files.

DDoS

Standing for “Distributed Denial of Service,” these Trojans will solicit your computer to send countless requests to a specific URL, with the aim of overloading the server and shutting down the site.

Spyware

Spyware aims to intercept your personal information. This goal is achieved by copying your files or using a screen or keylogger to record what you type and which websites you visit.

Ransomware

Ransom attacks are often carried out using a Trojan. Once the malware is on your computer, it locks you out of specific areas. The only way to regain access is by paying a fine.

While these are all common types of Trojans, their goals vary considerably. Most aim to steal information for financial gain. This can include bank information, online gaming details, IM log-ins, personal contacts, phone data and more.

How to Spot Trojans

Trojans are incredibly good at hiding. The whole point of their existence is that they trick users into installing them, and then work behind the scenes to achieve their aim. If you fall victim, you may not even realize it until it’s too late.

Look out for the following four signs, which may be a warning of Trojans attacking your computer:

Unexplained Behavior

Any mysterious increase in CPU usage is definitely a red flag. If your computer has increased its processing activity for no reason, then a Trojan may be the reason. Use your activity monitor to check what is draining your CPU, and end the action if you find a problem.

You can Google any processes you don’t recognize to determine whether they’re malicious or just part of normal system activity.

System Failures

If your system suddenly slows down significantly or starts crashing regularly, then there’s something wrong. Use a high-quality security suite to see if you can identify the problem.

Increase in Spam

Pop-ups, annoying adverts, and a general rise in spam on your machine could indicate an adware Trojan. This malware type uses infected ads to spread the virus further. Avoid clicking on anything that looks suspicious!

Unidentified Programs

If you spot an app or program that you didn’t download, it’s a cause for concern. Google the name to ensure it’s not an important part of the operating system. If it’s not— delete it immediately!

Here are four ways to defend yourself:

1)Install a High-Quality Antivirus

2) Avoid Third-Party Downloads

3)Stick to Trusted Sources

4)Use a Firewall

Explanation:

I hope this will help you ;D

Answered by dharamveer96
1

Answer:

This question is actually related to computer.

And according to that trojan is a virus that is inserted in computer by hackers for steeling important information and it can be defended by using antivirus software or by by having antiwalls

Similar questions