Caballo de Troya

Ver:

·         Código dañino

·         http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

·         BackOrifice

caballo de Troya

Introducción subrepticia en un medio no propicio, con el fin de lograr un determinado objetivo.

DRAE. Diccionario de la Lengua Española.

Troyano

También denominado “caballo de Troya”. Una clase de software malicioso que al instalarse permite al usuario ejecutar funciones normalmente, mientras los troyanos ejecutan funciones maliciosas sin que este lo sepa.

http://es.pcisecuritystandards.org

Troyano

Programa que no se replica ni hace copias de sí mismo. Su apariencia es la de un programa útil o inocente, pero en realidad tiene propósitos dañinos, como permitir intrusiones, borrar datos, etc. [CCN-STIC-430:2006]

Caballo de Troya

Programa que aparentemente, o realmente, ejecuta una función útil, pero oculta un subprograma dañino que abusa de los privilegios concedidos para la ejecución del citado programa.

Por ejemplo, un programa que reordene de una manera conveniente un fichero y, prevaliéndose de los derechos de escritura que debe concedérsele, copie el mismo en otro fichero accesible sólo por el creador de dicho programa.

[Ribagorda:1997]

(en) Trojan

A computer program that disguises itself as a useful software application, whereas its true purpose is to carry out and run a hidden, harmful transmission of material across a network. [CSS NZ:2011]

(en) Trojan horse

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. [CNSSI_4009:2010]

(en) Trojan horse

(I) A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. (See: malware, spyware. Compare: logic bomb, virus, worm.) [RFC4949:2007]

(en) trojan horse

Malicious program that masquerades as a benign application. [ISO-18043:2006]

(en) Trojan Horse

A non-replicating program that appears to be benign but actually has a hidden malicious purpose. [NIST-SP800-83:2005]

(en) Trojan Horse

A nonself-replicating program that seems to have a useful purpose, but in reality has a different, malicious purpose. [NIST-SP800-61:2004]

(en) Trojan horse

A computer program with an apparently or actually useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security. For example, making a "blind copy" of a sensitive file for the creator of the Trojan Horse. [TCSEC:1985]

(en) Trojan:

Also referred to as “Trojan horse.” A type of malicious software that when installed, allows a user to perform a normal function while the Trojan performs malicious functions to the computer system without the user’s knowledge.

https://www.pcisecuritystandards.org/security_standards/glossary.php

(en) Trojan Horse

A malicious program that disguises itself as a beneficial or entertaining program but that actually damages a computer or installs code that can counteract security measures (perhaps by collecting passwords) or perform other tasks (such as launching a distributed denial of service attack). Unlike a computer virus, a Trojan horse does not replicate itself.

http://www.csoonline.com/glossary/

(en) Trojan Horses

A Trojan Horse portrays itself as something other than what it is at the point of execution. While it may advertise its activity after launching, this information is not apparent to the user beforehand. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

http://www.symantec.com/avcenter/refa.html

(en) Trojan horse

In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. In one celebrated case, a Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus.

http://searchsoftwarequality.techtarget.com/glossary/

(en) Trojan Horse

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

http://www.sans.org/security-resources/glossary-of-terms/

(en) Trojan

Malware which masquerades as some other type of program such as a link to a web site, a desirable image, etc. to trick a user into installing it. Named for the Ancient Greek legend of the Trojan Horse.

http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas

Trojan

Également appelé «cheval de Troie». Logiciel malveillant qui, une fois installé, permet à un utilisateur d’effectuer les fonctions normales tandis que le Trojan effectue des actes malveillants sur un système informatique à l’insu de l’utilisateur.

http://fr.pcisecuritystandards.org/

(fr) Cheval de Troie

Programme malicieux, conçu par un pirate informatique, souvent dissimulé au sein d'un autre programme et installé sur un système à l'insu de son propriétaire. Le cheval de Troie constitue le point d'entrée sur le système infecté autorisant un pirate informatique à prendre le contrôle à distance du système et de ses ressources.

http://www.cases.public.lu/functions/glossaire/

(fr) Cheval de Troie

Un cheval de Troie est un programme d'aspect anodin, masquant un code exécutable malicieux déclenchant ou servant à déclencher une attaque.

Un cheval de Troie est en général utiliser pour ouvrir une porte dérobée (backdoor) sur un système.

http://securit.free.fr/glossaire.htm

Temas relacionados

Términos