Introducción
subrepticia en un medio no propicio, con el fin de lograr un determinado
objetivo.
DRAE.
Diccionario de la Lengua Española.
También
denominado “caballo de Troya”. Una clase de software malicioso que al
instalarse permite al usuario ejecutar funciones normalmente, mientras los
troyanos ejecutan funciones maliciosas sin que este lo sepa.
http://es.pcisecuritystandards.org
Programa que
no se replica ni hace copias de sí mismo. Su apariencia es la de un programa
útil o inocente, pero en realidad tiene propósitos dañinos, como permitir
intrusiones, borrar datos, etc. [CCN-STIC-430:2006]
Programa que
aparentemente, o realmente, ejecuta una función útil, pero oculta un
subprograma dañino que abusa de los privilegios concedidos para la ejecución
del citado programa.
Por ejemplo,
un programa que reordene de una manera conveniente un fichero y, prevaliéndose
de los derechos de escritura que debe concedérsele, copie el mismo en otro
fichero accesible sólo por el creador de dicho programa.
[Ribagorda:1997]
A computer program that
disguises itself as a useful software application, whereas its true purpose is
to carry out and run a hidden, harmful transmission of material across a
network. [CSS NZ:2011]
A computer program that
appears to have a useful function, but also has a hidden and potentially
malicious function that evades security mechanisms, sometimes by exploiting
legitimate authorizations of a system entity that invokes the program. [CNSSI_4009:2010]
(I) A computer program that
appears to have a useful function, but also has a hidden and potentially
malicious function that evades security mechanisms, sometimes by exploiting
legitimate authorizations of a system entity that invokes the program. (See:
malware, spyware. Compare: logic bomb, virus, worm.) [RFC4949:2007]
Malicious program that
masquerades as a benign application. [ISO-18043:2006]
A non-replicating program
that appears to be benign but actually has a hidden malicious purpose.
[NIST-SP800-83:2005]
A nonself-replicating
program that seems to have a useful purpose, but in reality has a different,
malicious purpose. [NIST-SP800-61:2004]
A computer program with an
apparently or actually useful function that contains additional (hidden)
functions that surreptitiously exploit the legitimate authorizations of the
invoking process to the detriment of security. For example, making a
"blind copy" of a sensitive file for the creator of the Trojan Horse.
[TCSEC:1985]
Also referred to as “Trojan
horse.” A type of malicious software that when installed, allows a user to
perform a normal function while the Trojan performs malicious functions to the
computer system without the user’s knowledge.
https://www.pcisecuritystandards.org/security_standards/glossary.php
A malicious program that
disguises itself as a beneficial or entertaining program but that actually
damages a computer or installs code that can counteract security measures
(perhaps by collecting passwords) or perform other tasks (such as launching a
distributed denial of service attack). Unlike a computer virus, a Trojan horse
does not replicate itself.
http://www.csoonline.com/glossary/
A Trojan Horse portrays
itself as something other than what it is at the point of execution. While it
may advertise its activity after launching, this information is not apparent to
the user beforehand. A Trojan Horse neither replicates nor copies itself, but
causes damage or compromises the security of the computer. A Trojan Horse must
be sent by someone or carried by another program and may arrive in the form of
a joke program or software of some sort. The malicious functionality of a
Trojan Horse may be anything undesirable for a computer user, including data
destruction or compromising a system by providing a means for another computer
to gain access, thus bypassing normal access controls.
http://www.symantec.com/avcenter/refa.html
In computers, a Trojan horse
is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and do its
chosen form of damage, such as ruining the file allocation table on your hard
disk. In one celebrated case, a Trojan horse was a program that was supposed to
find and destroy computer viruses. A Trojan horse may be widely redistributed
as part of a computer virus.
http://searchsoftwarequality.techtarget.com/glossary/
A computer program that
appears to have a useful function, but also has a hidden and potentially
malicious function that evades security mechanisms, sometimes by exploiting
legitimate authorizations of a system entity that invokes the program.
http://www.sans.org/security-resources/glossary-of-terms/
Malware which masquerades as
some other type of program such as a link to a web site, a desirable image,
etc. to trick a user into installing it. Named for the Ancient Greek legend of the
Trojan Horse.
http://cyber.law.harvard.edu/cybersecurity/Keyword_Index_and_Glossary_of_Core_Ideas
Également appelé
«cheval de Troie». Logiciel malveillant qui, une fois installé, permet à un
utilisateur d’effectuer les fonctions normales tandis que le Trojan effectue
des actes malveillants sur un système informatique à l’insu de l’utilisateur.
http://fr.pcisecuritystandards.org/
Programme malicieux,
conçu par un pirate informatique, souvent dissimulé au sein d'un autre programme
et installé sur un système à l'insu de son propriétaire. Le cheval de Troie
constitue le point d'entrée sur le système infecté autorisant un pirate
informatique à prendre le contrôle à distance du système et de ses ressources.
http://www.cases.public.lu/functions/glossaire/
Un cheval de Troie est
un programme d'aspect anodin, masquant un code exécutable malicieux déclenchant
ou servant à déclencher une attaque.
Un cheval de Troie est
en général utiliser pour ouvrir une porte dérobée (backdoor) sur un système.
http://securit.free.fr/glossaire.htm