1.5.2 Trojan Horses
This one should tie tightly (at least in your mind) to social engineering. A Trojan horse pretends to be something useful or interesting, yet, is really a virus or other malicious code whose writer decided the best way to distribute it would be to include it in a program that claims to do something useful. Unlike a regular virus, a Trojan horse is attached to a particular executable, and typically isnt capable of replicating and attaching itself to other files on your system.
Typically the Trojan horse relies on gaining users interests with something that sounds fun or curious. Sometimes they masquerade as some sort of data file where a user is asking for help. Because Trojan horses appear to be legitimate code, but have hidden functions designed to do nasty things, they are difficult to detect with an Intrusion Detection System (IDS).
As with viruses, prevention of Trojan horses on your system will largely be accomplished via anti-virus software and educating users not to open mysterious attachments.
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.