Open In App

Trojan Horse and Trap Door

Last Updated : 16 Jun, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

In this article, we will study why there is a need of security in brief followed by what exactly Program threats (like Trojan Horse and Trap Door). Let us first understand the need of security and program threats first.

Need of Security and Program Threats:

Security of a computer system (software one) is actually a crucial task. Security is very important to keep the threats away from the system. Mainly security covers integrity, confidentiality, and availability of the system. Security preserves the system from hacking and viruses, worms, and malware. A system is said to be secured if and if only all of its resources are used in the order as intended under all the circumstances as well as consequences, but no system can provide absolute guarantee from several malicious tasks or threats. If a user program is altered to do made malicious tasks, then it is known as Program Threat. 

Such two program threats (including Trojan Horse and Trap Door) are mentioned in the below-illustrated section:

1. Trojan Horse: 

  • A standalone malicious program that may give full control of an infected PC to another PC is called a Trojan horse. 
  • This is actually a code segment that tries to misuse its own environment.
  • They somehow look attractive but on the other hand, they are really harmful and they actually serve as virus carriers.
  • It may make copies of them, harm the host computer systems, or steal information. 
  • The Trojan horse will actually do damage once installed or run on your computer but at first, a glance will appear to be useful software. 
  • Trojans are designed as they can cause serious damage by deleting files and destroying information on your system.
  • Trojans allow confidential or personal information to be compromised by the system creating a backdoor on your computer that gives unauthorized users access to your system. 
  • Unlike Trojans do not self-replicate or reproduce by infecting other files nor do they self-replicate which means Trojan horse viruses differ from other computer viruses and do not spread themselves. 
  • The most popular Trojan horses are Beast, Zeus, The Blackhole Exploit Kit, Flashback Trojan, Netbus, Subseven, Y3K Remote Administration Tool, and Back Orifice.

2.Trap Door: 

  • A trap door is kind of a secret entry point into a program that allows anyone to gain access to any system without going through the usual security access procedures. 
  • Another definition of a trap door is it is a method of bypassing normal authentication methods. Therefore it is also known as a back door. 
  • Trap Doors are quite difficult to detect and also in order to find them the programmers or the developers have to go through the components of the system.
  • Programmers use Trap door legally to debug and test programs. Trap doors turn to threats when any dishonest programmers gain illegal access.
  • Program development and software update activities should be the first focus of security measures. The operating system that controls the trap doors is difficult to implement.

Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads