Statements (29)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:virus
malware |
gptkbp:canBeBypassedBy |
gptkb:security
|
gptkbp:canBeDeployedOn |
gptkb:keyboard
malware backdoor |
gptkbp:canSteal |
banking information
passwords personal data |
gptkbp:category |
cybercrime
|
gptkbp:controlledBy |
remote attacker
|
gptkbp:firstAppearance |
1980s
|
https://www.w3.org/2000/01/rdf-schema#label |
סוס טרויאני
|
gptkbp:namedAfter |
gptkb:Trojan_Horse_(mythology)
|
gptkbp:prevention |
gptkb:security
software updates user awareness |
gptkbp:relatedTo |
gptkb:virus
malware worm (malware) |
gptkbp:spreadTo |
phishing
malicious downloads social engineering |
gptkbp:usedFor |
data theft
unauthorized access remote control of computers |
gptkbp:英文名 |
Trojan
|
gptkbp:bfsParent |
gptkb:טרויה
|
gptkbp:bfsLayer |
6
|