Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware

Journal Title: Bilgi Yönetimi - Year 2019, Vol 2, Issue 1

Abstract

As the use of technological devices increases, malicious people develop and spread new types of malicious software every day in order to harm these devices and their users. Although security measures are taken against these widespread threats affecting individuals and institutions, the vulnerabilities continue to exist. Many of the cyberattackers uses malware to attack by exploiting existing security vulnerabilities. Trojans are extremely dangerous kind of malicious software that infiltrates the victim system by hiding themselves inside a seemingly harmless file extension. The Remote Access Trojan Horse, however, provides remote access to the attacker after infecting the victim system. In this way, the attacker can access the files and passwords in the system, and convert the victim system into a slave system that can perform regular, coordinated attacks. In this study, it is aimed to define Remote Access Trojans, to explain their methods of infiltration into the victim system and the measures that can be taken against this threat and to raise user awareness.

Authors and Affiliations

İlker Kara

Keywords

Related Articles

Rewievs

Presentation and Evaluation, Book Reviews, Information Systems, Information Management, Information Management, Document Management

The Significance and Contributions of Document/Information Management in the Decision-Making Processes as a Part of Management Action

Decision-making is one of the most important elements for individuals, institutions, and organizations to maintain their lives and carry out their activities. In institutions and organizations, the decision-making mechan...

Revealing Tacit Knowledge In Organizations Through Recommender Systems, Supported By Artificial Intelligence

The current and future success of organizations depends on identifying, revealing and making more use of tacit knowledge, as part of the internal knowledge held within organizations. In the current competitive environmen...

From Editor

First issue editor's post

Health Information Systems Management and Evaluation of Social Memory/Future Perspective

Information systems change their working methods and conditions and are located in all areas of life as applications that allow time and space obstacle to be overcome. Information management systems are applications that...

Download PDF file
  • EP ID EP598344
  • DOI 10.33721/by.542743
  • Views 52
  • Downloads 0

How To Cite

İlker Kara (2019). Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware. Bilgi Yönetimi, 2(1), 28-33. https://europub.co.uk./articles/-A-598344