Definition: A Trojan Horse is a variant of malicious software that can be delivered to an information resource. This variety of malware is saved within the information infrastructure and awaits a triggering condition and then it is activated. A variety of unauthorized activities including theft of resources and other harmful acts can be wrought on an individual's computer or that of a network.
Its Relevance: This threat vector can compromise an entire computer system and turn over access to information assets and information operations to the attacker. This software can perform a variety of damaging activities such as erasing files and uploading additional malicious software.
The logging of keystrokes can be the mission this type of malware and the cracker who has gained access can be made aware of key operations and highly sensitive information. The stolen information would then be reported back to the intruder.