Computer Science, asked by komalatejasri, 3 months ago

write one saftey measure to be taken to prevent trojan horse​

Answers

Answered by prakashnitu1979
1

Answer:

As with protecting against most common cybersecurity threats, effective cybersecurity software should be your front line of protection. An effective internet security solution should run fast, frequent scans and alert you as soon as a Trojan virus is detected.

If you're reading this because it's already too late, see our page on removing malware infecting your computer. If you're reading this to stay safe from these types of attacks in the future, there are a few best practices in addition to installing cybersecurity software to help keep yourself safe:

Never download or install software from a source you don’t trust completely

Never open an attachment or run a program sent to you in an email from someone you don’t know.

Keep all software on your computer up to date with the latest patches

Make sure a Trojan antivirus is installed and running on your computer

Answered by ritika678085
1

Answer:

2020)

Trojan-Downloader: is a type of virus that downloads and installs other malware.

Trojan-Droppers are complex programs used by cyber criminals to install malware. Most antivirus programs do not detect droppers as malicious, and hence it is used to install viruses.

Ransomware - It is a type of Trojan (Trojan - ransom) that can encrypt the data on your computer/device. The cyber criminals who control this ransomware would demand a ransom for providing the decryption key. It is very difficult to recover the data without the decryption key. The WannaCry and Petya were recent ransomware attacks. Cyber security experts recommend users to follow a robust and systematic backup and recovery policy

Trojan-Banker malware programs steal account-related information related to card payments and online banking.

Trojan-Rootkits prevent detection of malware and malicious activities on the computer. These are sophisticated malware that provides control of the victim's device. Rootkits are also used to enroll the victim's device as part of a botnet.

Trojan-Backdoor is a popular type of Trojan. It creates a backdoor to allow cyber criminals to access the computer later on from remote using a remote access tool (RAT). As this Trojan provides complete control over the computer, it is a dangerous but commonly used Trojan.

Similar questions