A Trojan Horse is a variant of malicious software that can be delivered to an information resource. This variety of malware is deposited within an information infrastructure and awaits a triggering condition and is then activated. A variety of unauthorized activities including theft of resources and other harmful acts can be wrought on an individual's computer or that of a network.
Its Relevance: This threat vector can compromise an entire computer system and turn over access to information assets and information operations to the attacker. This software can perform a variety of damaging activities such as erasing files and uploading additional malicious software. The logging of keystrokes can also be ordered by this type of malware and the cracker who has gained access can be made aware of key operations and highly sensitive information. The stolen information would then be reported back to the intruder.
Return from "Trojan Horse" to Words [S - U]