Ver:
· http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
Introducción
subrepticia en un medio no propicio, con el fin de lograr un determinado
objetivo.
DRAE.
Diccionario de la Lengua Española.
También
denominado caballo de Troya. Una clase de software malicioso que al
instalarse permite al usuario ejecutar funciones normalmente, mientras los
troyanos ejecutan funciones maliciosas sin que este lo sepa.
http://es.pcisecuritystandards.org
Programa que
no se replica ni hace copias de sí mismo. Su apariencia es la de un programa
útil o inocente, pero en realidad tiene propósitos dañinos, como permitir
intrusiones, borrar datos, etc. [CCN-STIC-430:2006]
Programa que
aparentemente, o realmente, ejecuta una función útil, pero oculta un
subprograma dañino que abusa de los privilegios concedidos para la ejecución
del citado programa.
Por ejemplo,
un programa que reordene de una manera conveniente un fichero y, prevaliéndose
de los derechos de escritura que debe concedérsele, copie el mismo en otro
fichero accesible sólo por el creador de dicho programa.
[Ribagorda:1997]
A computer
program that disguises itself as a useful software application, whereas its
true purpose is to carry out and run a hidden, harmful transmission of material
across a network. [CSS NZ:2011]
A computer
program that appears to have a useful function, but also has a hidden and
potentially malicious function that evades security mechanisms, sometimes by
exploiting legitimate authorizations of a system entity that invokes the
program. [CNSSI_4009:2010]
(I) A computer
program that appears to have a useful function, but also has a hidden and
potentially malicious function that evades security mechanisms, sometimes by
exploiting legitimate authorizations of a system entity that invokes the
program. (See: malware, spyware. Compare: logic bomb, virus, worm.)
[RFC4949:2007]
Malicious program
that masquerades as a benign application. [ISO-18043:2006]
A non-replicating
program that appears to be benign but actually has a hidden malicious purpose.
[NIST-SP800-83:2005]
A
nonself-replicating program that seems to have a useful purpose, but in reality
has a different, malicious purpose. [NIST-SP800-61:2004]
A computer program
with an apparently or actually useful function that contains additional
(hidden) functions that surreptitiously exploit the legitimate authorizations
of the invoking process to the detriment of security. For example, making a
"blind copy" of a sensitive file for the creator of the Trojan Horse.
[TCSEC:1985]
Also referred to
as Trojan horse. A type of malicious software that when installed, allows a
user to perform a normal function while the Trojan performs malicious functions
to the computer system without the users knowledge.
https://www.pcisecuritystandards.org/security_standards/glossary.php
A malicious
program that disguises itself as a beneficial or entertaining program but that
actually damages a computer or installs code that can counteract security
measures (perhaps by collecting passwords) or perform other tasks (such as
launching a distributed denial of service attack). Unlike a computer virus, a
Trojan horse does not replicate itself.
http://www.csoonline.com/glossary/
A Trojan Horse
portrays itself as something other than what it is at the point of execution.
While it may advertise its activity after launching, this information is not
apparent to the user beforehand. A Trojan Horse neither replicates nor copies
itself, but causes damage or compromises the security of the computer. A Trojan
Horse must be sent by someone or carried by another program and may arrive in
the form of a joke program or software of some sort. The malicious functionality
of a Trojan Horse may be anything undesirable for a computer user, including
data destruction or compromising a system by providing a means for another
computer to gain access, thus bypassing normal access controls.
http://www.symantec.com/avcenter/refa.html
In computers, a
Trojan horse is a program in which malicious or harmful code is contained
inside apparently harmless programming or data in such a way that it can get
control and do its chosen form of damage, such as ruining the file allocation
table on your hard disk. In one celebrated case, a Trojan horse was a program
that was supposed to find and destroy computer viruses. A Trojan horse may be
widely redistributed as part of a computer virus.
http://searchsoftwarequality.techtarget.com/glossary/
A computer
program that appears to have a useful function, but also has a hidden and
potentially malicious function that evades security mechanisms, sometimes by
exploiting legitimate authorizations of a system entity that invokes the
program.
http://www.sans.org/security-resources/glossary-of-terms/
Malware which
masquerades as some other type of program such as a link to a web site, a
desirable image, etc. to trick a user into installing it. Named for the Ancient
Greek legend of the Trojan Horse.
http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas
Également appelé
«cheval de Troie». Logiciel malveillant qui, une fois installé, permet à un
utilisateur deffectuer les fonctions normales tandis que le Trojan effectue
des actes malveillants sur un système informatique à linsu de lutilisateur.
http://fr.pcisecuritystandards.org/
Programme malicieux,
conçu par un pirate informatique, souvent dissimulé au sein d'un autre programme
et installé sur un système à l'insu de son propriétaire. Le cheval de Troie
constitue le point d'entrée sur le système infecté autorisant un pirate
informatique à prendre le contrôle à distance du système et de ses ressources.
http://www.cases.public.lu/functions/glossaire/
Un cheval de Troie est
un programme d'aspect anodin, masquant un code exécutable malicieux déclenchant
ou servant à déclencher une attaque.
Un cheval de Troie est
en général utiliser pour ouvrir une porte dérobée (backdoor) sur un système.
http://securit.free.fr/glossaire.htm
Temas relacionados