Trojan horse: A type of malicious program that disguises itself as legitimate and often desirable software to deceive users into downloading and installing it. Once inside the system, it can execute harmful tasks such as stealing data, compromising system integrity, or creating backdoors for unauthorized access.
Categories: CC D5: Security Operations | CCSP D4: Cloud Application Security | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D7: Systems and Application Security
Related Articles: