3. Trojan Horse a program that installs malicious software while under the guise of doing something else. malicious code that is well disguised and claims to be a useful program or legitimate software. pose as useful programs but contain hidden commands. does things to the user’s computer that the user does not want or intend computer threats that perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine.
4. Types of Trojan Horse Trojan Horse A useful software program that is corrupted by hacker and cracker inserts malicious code into the program that executes while the program is used. Act as key loggers that send what all you are typing to an outside system.