The list below shows some of the activities that the attacker can perform using a Trojan horse. The program is usually disguised as something that is useful to the user.
Topics covered in this tutorial What is a Trojan? What is a worm? What is a virus? Trojans, viruses, and worms Countermeasures What is a Trojan horse? We will also look at the countermeasures that can be used to protect against such activities. In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. Trojans, viruses, and worms can be used to achieve the above-stated objectives. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. They often use these skills to gain access to systems. Some of the skills that hackers have are programming and computer networking skills.