Briefly describe Trojan horse malware and give an example.

What will be an ideal response?

A computer Trojan horse (or just Trojan) is an executable program that masquerades as performing a benign activity but also does something malicious. For example, a user may download what is advertised as a calendar program, yet when it is installed, in addition to installing the calendar it installs malware that scans the system for credit card numbers and passwords, connects through the network to a remote system, and then transmits that information to the attacker.

Computer Science & Information Technology

You might also like to view...

An advantage to using mail merge is that multiple documents, where only certain portions vary, can be created quickly

Indicate whether the statement is true or false

Computer Science & Information Technology

Blogger is part of the Google network of sites, so the Blogger site integrates nicely with Google's AdWords program

Indicate whether the statement is true or false

Computer Science & Information Technology