Security is very important to keep the threats away from the system. Mainly security covers integrity, confidentiality, and availability of the system.
Security preserves the system from hacking and viruses, worms and malware. If a user program is altered to do made malicious tasks, then it is known as Program Threats.
Such two program threats are mentioned as below:
- Trojan Horse :
A standalone malicious program which may give full control of infected PC to another PC is called Trojan horse. It may make copies of them, harm the host computer systems, or steal information.
The Trojan horse will actually do damage once installed or run on your computer but at first glance will appear to be useful software. Trojans are designed as they can cause serious damage by deleting files and destroying information on your system.
Trojans allow confidential or personal information to be compromised by system creating a backdoor on your computer that gives unauthorized users access to your system. Unlike Trojans do not self replicate reproduce by infecting other files nor do they self-replicate. Means Trojan horse viruses differ from other computer viruses and do not spread themselves.
Most popular Trojan horses are Beast, Zeus, The Blackhole Exploit Kit, Flashback Trojan, Netbus, Subseven, Y3K Remote Administration Tool, Back Orifice.
- Trap Door :
A trap door is kind of a secret entry point into a program that allows anyone gain access to any system without going through the usual security access procedures. Other definition of trap door is it is a method of bypassing normal authentication methods. Therefore it is also known as back door.
Programmers use Trap door legally to debug and test programs. Trap doors turns to threats when any dishonest programmers to gain illegal access. Program development and software update activities should be first focus of security measures. Operating system that controls the trap doors is difficult to implement.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Difference between Spyware and Trojan Horse
- Difference between Virus, Worm and Trojan Horse
- View Recycling in Android with ListView
- Difference between Google Meet and Cisco Webex
- Difference between Zoom and Google Meet
- Difference between .com and .org domain
- GRE | List of words to enhance your vocabulary with root alphabet ‘G’
- ISCII Encoding
- Difference between Dropbox and MiMedia
- Difference between Google Drive and MiMedia
- Overview of Near-me Area Network (NAN)
- Difference between Document Type Definition (DTD) and XML Schema Definition (XSD)
- Difference between .com and .net domain
- Difference between .net and .org domain
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.