Statements (29)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:virus
gptkb:malware |
| gptkbp:canBeBypassedBy |
gptkb:security
|
| gptkbp:canBeDeployedOn |
gptkb:keyboard
gptkb:malware backdoor |
| gptkbp:canSteal |
banking information
passwords personal data |
| gptkbp:category |
gptkb:cybercrime
|
| gptkbp:controlledBy |
remote attacker
|
| gptkbp:firstAppearance |
1980s
|
| gptkbp:namedAfter |
gptkb:Trojan_Horse_(mythology)
|
| gptkbp:prevention |
gptkb:security
software updates user awareness |
| gptkbp:relatedTo |
gptkb:virus
gptkb:malware worm (malware) |
| gptkbp:spreadTo |
phishing
malicious downloads social engineering |
| gptkbp:usedFor |
data theft
unauthorized access remote control of computers |
| gptkbp:英文名 |
gptkb:Trojan
|
| gptkbp:bfsParent |
gptkb:טרויה
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
סוס טרויאני
|