First page Back Continue Last page Summary Graphics
Threat | Malware contd
Trojan Horse
- Malicious program disguised as something benign
- Two parts
- Visible useful part
- Invisible malicious part... may be destructive or create vulnerability for future exploitation
- Replicate through users sharing files
- Ex: Fun executable
- Visible effect: Entertaining cartoon
- Concealed effect: Installs remote-control program
- Replicates: Users share with each other via email, floppy disk, etc.
Note: These different types not mutually exclusive