Defined term

Trojan Horse

Trojan Horse: A computer program that appears to have a useful function, but also has a hidden and potentially mali- cious function that evades security…

Verified
🏆 High Consensus
Cybersecurity

Definition

A computer program that appears to have a useful function, but also has a hidden and potentially mali- cious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Alternative Definitions

Definition 2

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Source: Committee on National Security Systems Glossary CNSSI 4009-2015Type: standard
Definition 3

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. (From: CNSSI 4009) (NICCS)

Source: The Cyber GlossaryType: external

Sources

1
The State and Local Election Cybersecurity Playbook
View Source
2
Committee on National Security Systems Glossary CNSSI 4009-2015
View Source
3
March 2020 CSC Report
View Source
4
NICCS Glossary
View Source
5
The Cyber Glossary
View Source

Continue Research

Browse the full glossary for adjacent terms, or subscribe for updates when definitions and sources are expanded.