Trojan horse: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create page. Sources: The Treasurer, Nov-Dec 2017, p08, Oxford English Dictionary.) |
imported>Doug Williamson (Classify page.) |
||
Line 9: | Line 9: | ||
More generally, any device or strategy involving deception and concealment, designed to attack an opponent. | More generally, any device or strategy involving deception and concealment, designed to attack an opponent. | ||
The term originates from the myth in which soldiers attacking Troy hid inside an innocuous wooden horse, that the defenders then pulled through the gates of their own besieged city. | |||
Line 16: | Line 19: | ||
*[[Malware]] | *[[Malware]] | ||
*[[Ransomware]] | *[[Ransomware]] | ||
[[Category:Identify_and_assess_risks]] |
Latest revision as of 08:48, 29 June 2022
1. Cyberthreats
A trojan horse is computer software designed to breach the security of a system, while ostensibly performing a useful or innocuous function.
Sometimes abbreviated to 'trojan'.
2.
More generally, any device or strategy involving deception and concealment, designed to attack an opponent.
The term originates from the myth in which soldiers attacking Troy hid inside an innocuous wooden horse, that the defenders then pulled through the gates of their own besieged city.