Trojan Horse

From FISMApedia
Jump to: navigation, search

CNSSI 4009

Program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. (See malicious code.)

NIST SP 800-28v2

A useful or seemingly useful program that contains hidden code of a malicious nature that executes when the program is invoked.

NIST SP 800-46

(a.k.a. Trojan) A Trojan horse is a useful or seemingly useful program that contains hidden code of a malicious nature. When the program is invoked, so is the undesired function whose effects may not become immediately obvious. The name stems from an ancient exploit of invaders gaining entry to the city of Troy by concealing themselves in the body of a hollow wooden horse, presumed to be left behind by the invaders as a gift to the city.

NIST SP 800-47

A computer program containing an apparent or actual useful function that also contains additional functions that permit the unauthorized collection, falsification, or destruction of data.

NIST SP 800-61

A nonself-replicating program that seems to have a useful purpose, but in reality has a different, malicious purpose.

NIST SP 800-61r1

A non-self-replicating program that seems to have a useful purpose, but in reality has a different, malicious purpose.

NIST SP 800-83

A non-replicating program that appears to be benign but actually has a hidden malicious purpose.