Information Technology Threat

Any circumstance or event that can cause adverse effects on the assets, individuals or operations of an organization through information system (Lund et al, 2010, p.48) is defined as a threat. Computer threads lead to disclosure, modification, unauthorized access, services denial and destruction of someone’s computer. Many threats exist in information technology in terms of consumer information as well as internal secrets. Hackers, who are smart at programming, create havoc in the industry through spyware and malware. They also break codes to access privileged information from computers. This paper focuses on Trojan virus which is non-self replicating malware.

The damage Trojan causes

Organization systems are automated. Computers are targeted as a result of bad employee-employer relation and tough competition. Trojan carries out functions that are desirable but also facilitates access that is unauthorized to other people’s computers. It uses online materials or downloads to get access into computers (Erbschloe, 2004, p 22). The Trojans originate from hackers who create them with care in order to make them genuine.

Trojans facilitate electronic theft, data theft and password retrieval and they also spread botnet as well as distribute service denial service attacks.

Removal and prevention

Trojan is neither a worm nor a virus as such it cannot reproduce in a machine that is affected. To minimize the risk, computers should be switched off when they are not been used. They have the ability to scan through the internet to find computers that are susceptible and users should always be vigilant about the type of files they are opening.

Trojans can be detected and removed through use of anti-virus programs. The software should have the capability of carrying out quarantine and also delete the Trojan.


Caution should be exercised by organizations that are dealing with computer threat cases as there are different types of threat. These threats can also have adverse effects on the performance of an organization. Simple caution such as switching off computers should be observed.