It was made popular by Ken Thompson in his 1983 Turing Award acceptance lecture "Reflections on Trusting Trust", subtitled: To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. It's not clear where or when the concept, and this term for it, was first used, but by 1971 the first Unix manual assumed its readers knew both: Īlso, one may not change the owner of a file with the set-user-ID bit on, otherwise one could create Trojan Horses able to misuse other’s files.Īnother early reference is in a US Air Force report in 1974 on the analysis of vulnerability in the Multics computer systems. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves. Ransomware attacks are often carried out using a Trojan. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller who can then have unauthorized access to the affected computer. Trojans generally spread by some form of social engineering for example, where a user is duped into executing an email attachment disguised to appear innocuous (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. In computing, a Trojan horse is any malware that misleads users of its true intent. Security information and event management (SIEM).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |