U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

trojan horse

Definition(s):

  A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
Source(s):
CNSSI 4009-2015
NIST SP 800-12 Rev. 1 under Trojan Horse from CNSSI 4009
NIST SP 800-82 Rev. 2 under Trojan Horse from RFC 4949

  A useful or seemingly useful program that contains hidden code of a malicious nature that executes when the program is invoked.
Source(s):
NIST SP 800-28 Version 2 under Trojan Horse

  A computer program containing an apparent or actual useful function that also contains additional functions that permit the unauthorized collection, falsification, or destruction of data.
Source(s):
NIST SP 800-47 [Superseded] under Trojan Horse