Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Paris
|
gptkbp:caused_by |
data loss
privacy invasion system damage |
gptkbp:character_appearance |
gptkb:video_game
gptkb:mobile_application legitimate software |
gptkbp:delivers |
email attachments
USB drives malicious websites file sharing networks |
gptkbp:has_style |
Trojan horse
Trojan banker Trojan downloader Trojan ransomware Trojan virus |
https://www.w3.org/2000/01/rdf-schema#label |
Trojan
|
gptkbp:is_aimed_at |
government agencies
business networks unsuspecting users |
gptkbp:is_associated_with |
financial loss
identity theft cybercrime |
gptkbp:is_atype_of |
gptkb:Person
businesses government systems |
gptkbp:is_considered |
a form of cyber attack
a serious cybersecurity threat a type of social engineering attack |
gptkbp:is_often_depicted_as |
gaming applications
file-sharing software free software downloads |
gptkbp:is_often_used_in |
phishing attacks
social engineering tactics malicious ads |
gptkbp:is_part_of |
malware analysis
cybersecurity discussions computer security education |
gptkbp:is_protected_by |
gptkb:virus
firewalls user education |
gptkbp:is_used_for |
data theft
unauthorized access spying monitor user activity create botnets installing other malware steal credentials |
gptkbp:named_after |
the Trojan Horse from Greek mythology
|
gptkbp:recognizes |
behavioral analysis
signature-based detection |
gptkbp:replaced_by |
system restore
malware removal tools reinstalling the operating system |
gptkbp:social_responsibility |
gptkb:smartphone
computers |