Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Trojan

Encyclopedia of Internet Technologies and Applications
A Trojan (aka Trojan horse) is a software program in which harmful or malicious code is contained within another program. When this program executes, the Trojan performs a specific set of actions, usually working toward the goal of allowing itself to persist on the target system.
Published in Chapter:
Hackers, Hacking, and Eavesdropping
Kevin Curran (University of Ulster, Ireland), Peter Breslin (University of Ulster, Ireland), Kevin McLaughlin (University of Ulster, Ireland), and Gary Tracey (University of Ulster, Ireland)
Copyright: © 2008 |Pages: 6
DOI: 10.4018/978-1-59140-993-9.ch029
Abstract
"Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorised access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Thus not only would accessing a server by cracking its password authentication system be unauthorised access, switching on a computer system without the permission of the person in charge of such a computer system would also be unauthorised access.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber Security Operations Centre Concepts and Implementation
A type of malicious software that is designed to look legitimate.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
A malicious program that is hidden within a seemingly useful and harmless program. Also known as a Trojan horse.
Full Text Chapter Download: US $37.50 Add to Cart
POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
Trojan or Trojans, a malware that acts just like in the history of Trojan Horse, entering the computer and creating a port for a possible invasion.
Full Text Chapter Download: US $37.50 Add to Cart
Detection and Prediction of Spam Emails Using Machine Learning Models
A type of computer virus in the form of computer software such as utilities, games, and sometimes even antivirus programs.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrimes Technologies and Approaches
A malicious program that pretends to be something desirable. It hides its true identity.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Apps Threats
Trojans can be used to collect confidential information or to install other malicious applications like worms or botnets. Trojans can be also used to commit phishing activities. (Sujithra & Padmavathi, 2012 AU22: The in-text citation "Sujithra & Padmavathi, 2012" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: The Cyber Extortionist
A type of malware that impersonates legitimate content to gain entry into a victim’s system. It gets its name from a Greek myth involving a wooden horse in the Battle of Troy.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
A malicious program that is hidden within a seemingly useful and harmless program. Also known as a Trojan horse.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR