Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Trojan Horse

Handbook of Research on Wireless Security
A Trojan horse is any software program containing a covert malicious function.
Published in Chapter:
Malicious Software in Mobile Devices
Thomas M. Chen (Southern Methodist University, USA) and Cyrus Peikari (Airscanner Mobile Security Corporation, USA)
Copyright: © 2008 |Pages: 10
DOI: 10.4018/978-1-59904-899-4.ch001
Abstract
This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While malware is rampant among 1 billion PCs, approximately twice as many mobile users currently enjoy a malware-free experience. However, since the appearance of the Cabir worm in 2004, malware for mobile devices has evolved relatively quickly, targeted mostly at the popular Symbian smartphone platform. Significant highlights in malware evolution are pointed out that suggest that mobile devices are attracting more sophisticated malware attacks. Fortunately, a range of host-based and network-based defenses have been developed from decades of experience with PC malware. Activities are underway to improve protection of mobile devices before the malware problem becomes catastrophic, but developers are limited by the capabilities of handheld devices.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Overview of Threats to Information Security
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Full Text Chapter Download: US $37.50 Add to Cart
A Study on Supervised Machine Learning Technique to Detect Anomalies in Networks
It is a kind of malware that misleads the users from its true intent.
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software
A type of malware with a hidden malicious function.
Full Text Chapter Download: US $37.50 Add to Cart
Taxonomy of Cyber Threats to Application Security and Applicable Defenses
Malicious computer code that claims to perform some benign function while actually performing some additional, malicious function.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethics of Deception in Cyberspace
Software that conceals a malicious intent.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
Trojan is a kind of malware that pretends itself to do some useful work in to the benign user but in the background it performs some malicious activity like steal the sensitive information, corruption of the important data etc.
Full Text Chapter Download: US $37.50 Add to Cart
Mathematical Models for Computer Virus: Computer Virus Epidemiology
A destructive program that masquerades as a benign application.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR