ATIS Telecom Glossary
Tuesday, September 30, 2014

A B C D E F G H I
J K L M N O P Q R
S T U V W X Y Z  
Go
 
Glossary Home
Foreword
Introduction
Normative References
Using the ATIS Telecom Glossary
Annex A: Informative References
 
 
 
<< Back
Trojan horse
1. An apparently harmless program containing malicious logic that allows the unauthorized collection, falsification, or destruction of data. [2382-pt.8] 2.  [A] program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. [INFOSEC-99]    3.  A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. For example, making a "blind copy" of a sensitive file for the creator of the Trojan Horse [TCSEC].

 

 

 

 

 

 

 

 

 

 



 
These definitions were prepared by ATIS Committee PRQC
 
For more information on the work related to these definitions,
please visit the ATIS website and the ATIS Document Center