top of page
Search

I thought a Trojan Horse was only used in the 12th century?

  • Writer: Rocco Paul
    Rocco Paul
  • Sep 21, 2020
  • 2 min read

Cyber crime and it's categories are a lot bigger than I thought they were. Last week with my third assessment written in third article annotated, I specifically looked into different cybercrime categories, as well as the specific things that they are and do. Before getting into some new things I had learned, one thing that I loved about this document is that it drove me to deeper thinking with one specific and common virus. The Trojan Horse. Everyone has seen the Trojan Horse, it is something that looks really really good but it's fake, this is such as something that says you've won a free Amazon gift card yet it brings you to a virus. While reading it told me the Trojans coming to the two parts, a client part and a server part. This is interesting to me because thinking and looking at Trojan horses, I had just figured that someone just puts this on to the computer through different networks or something. But I was wrong. It actually connects to a server which starts the Trojan and that server is connected through a client (Vadza). So it's almost as if it is a Correlation with a worm virus. That is something new that I had learned, and it is a virus that just goes forth between different computers, it just goes and goes and goes and keeps going until someone stops it (Vadza). Both of these Concepts, one being known but explaining more, as well as the new one learned, help drive my thinking in two different ways that viruses can be stopped. Like can there be a way to limit the way people can obtain server access? As well as the question as how can a worm be automatically identified, and stopped on the spot with a code or even an application? This is something that I am truly interested in looking into next week...

 
 
 

Comments


bottom of page