![]() ![]() The list below shows some of the activities that the attacker can perform using a Trojan horse. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc. The program is usually disguised as something that is useful to the user. ![]() Trojans, viruses, and worms CountermeasuresĪ Trojan horse is a program that allows the attack to control the user’s computer from a remote location.We will also look at the countermeasures that can be used to protect against such activities. ![]() In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. Trojans, viruses, and worms can be used to achieve the above-stated objectives. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. They often use these skills to gain access to systems. Some of the skills that hackers have are programming and computer networking skills.
0 Comments
Leave a Reply. |