Detection, Technical Analysis and Recommended Solutions of Trojan Horse Malware
Journal Title: Bilgi Yönetimi - Year 2019, Vol 2, Issue 1
Abstract
As the use of technological devices increases, malicious people develop and spread new types of malicious software every day in order to harm these devices and their users. Although security measures are taken against these widespread threats affecting individuals and institutions, the vulnerabilities continue to exist. Many of the cyberattackers uses malware to attack by exploiting existing security vulnerabilities. Trojans are extremely dangerous kind of malicious software that infiltrates the victim system by hiding themselves inside a seemingly harmless file extension. The Remote Access Trojan Horse, however, provides remote access to the attacker after infecting the victim system. In this way, the attacker can access the files and passwords in the system, and convert the victim system into a slave system that can perform regular, coordinated attacks. In this study, it is aimed to define Remote Access Trojans, to explain their methods of infiltration into the victim system and the measures that can be taken against this threat and to raise user awareness.
Authors and Affiliations
İlker Kara
Rewievs
Presentation and Evaluation, Book Reviews, Information Systems, Information Management, Information Management, Document Management
The Significance and Contributions of Document/Information Management in the Decision-Making Processes as a Part of Management Action
Decision-making is one of the most important elements for individuals, institutions, and organizations to maintain their lives and carry out their activities. In institutions and organizations, the decision-making mechan...
Revealing Tacit Knowledge In Organizations Through Recommender Systems, Supported By Artificial Intelligence
The current and future success of organizations depends on identifying, revealing and making more use of tacit knowledge, as part of the internal knowledge held within organizations. In the current competitive environmen...
From Editor
First issue editor's post
Health Information Systems Management and Evaluation of Social Memory/Future Perspective
Information systems change their working methods and conditions and are located in all areas of life as applications that allow time and space obstacle to be overcome. Information management systems are applications that...