Join Lisa Bock for an in-depth discussion in this video Understanding Trojans, part of IT Security Foundations: Core Concepts.
- A Trojan is a program that appears to be innocent but has been designed to cause some malicious activity, or provide a backdoor to your system. You might download a free trial of a game but within that game there is some malware. Once you download and install the game the malware then embeds itself onto your system. Most endpoint anti-malware protection systems work by assessing the reputation of a site before you visit the site.
For example, if I wanted to go to a website my anti-malware protection might throw up a warning saying that that site might be harmful to your computer. If that happens, you should avoid going to that site. There are websites out there that provide tools for looking up potentially malicious websites. Here is one that shows us a lot about websites that might be malicious. In addition to talking about their reputation data, it also talks about phishing websites, historical data, and other information to help you make a decision as to whether or not you will go to that site.
I'll take a look at BrightCloud, and I'll put in example.com. I put in the capthca, and it tells me that that site is trustworthy. There may be cases that you would get one that says moderate. Use judgement before going to that site, and avoid it if you're suspicious. In Security Education, use a firewall to monitor your system. Pay attention to any warnings your anti-malware protection gives you.
If infected, there are websites available to guide you in the removal of malware. I've gone to bleepingcomputer.com where there's only one example here as to how to remove a Trojan, virus, worm, or other malware. Doing a keyword search on the same thing will probably yield you lots of results from which you can choose from If all else fails, protect your system by using system restore. System restore is safe to use as it doesn't alter your files, however, you should reduce the damage from a ransomeware attack by backing up and encrypting your files.
A system restore won't protect against a ransomeware attack.
Note: This course maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals 98-367 certification exam and is recommended test prep viewing.
- Differentiate between risks, threats, and vulnerabilities.
- Explain how to avoid worms and viruses.
- Define cookies, and explain how they preserve user information.
- Describe the WPA2 wireless security method.
- Cite the differences between public and private key encryption.
- Summarize how to use a virtual private network.
- Identify ways to minimize the attack surface.