Skip to Main Content
Idaho State University

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
Trojan Horse
  • An apparently useful program containing hidden code which allows the unauthorized collection, falsification, or destruction of data. (AFR 205-16;) 2. A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. For example, making a "blind copy" of a sensitive file for the creator of the Trojan Horse. (CSC-STD-001-83;) 3. A computer program that is apparently or actually useful and that contains a trap door. (FIPS PUB 39;) 4. A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security or integrity. For example, making a "blind copy" of a sensitive file for the creator of the Trojan horse. (NCSC-WA-001-85;) 5. A trojan horse is a computer program that appears to perform a useful and innocent function, but it contains additional hidden functions that exploit the legitimate authorizations of the user who invokes the trojan horse. For example, it may make an unauthorized copy of a sensitive file for the creator of the Trojan Horse. (IC;)