Describe the Zeus Trojan, how it has been used in the past, how to detect it, and how to remove it.

Learning Objectives and Outcomes

  • Describe the Zeus Trojan, how it has been used in the past, how to detect it, and how to remove it.

Assignment Requirements

You work for General Technology Security, Inc. (GTSI), a military contractor specializing in information systems security.

A Department of Defense employee has had his personal banking information stolen. The perpetrators transferred thousands of dollars out of his personal bank accounts. In addition to contacting the bank and the police, this employee informed his superiors about the theft. He is concerned that his work laptop could be infected with malware as well as his home computer. The DoD has contacted GTSI for help in investigating the matter.

The DoD wants to make sure that the malware used in this theft is not residing on any of its computers. GTSI agreed to examine a number of DoD devices as well as the employee’s personal home computer to look for the malware. It is possible that the malware is the Zeus Trojan.

For this assignment:

  • Research the Zeus Trojan.
  • Write a report that describes how it has been used in the past, how to detect it, and how to remove it.
Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: