Statements (59)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:virus
|
gptkbp:available_at |
email attachments
USB drives malicious websites file sharing networks |
gptkbp:can_be_used_to |
monitor user activity
create botnets steal credentials |
gptkbp:can_cause |
data loss
privacy invasion system damage |
gptkbp:can_detect |
behavioral analysis
signature-based detection |
gptkbp:costume_design |
gptkb:video_games
gptkb:software legitimate software |
gptkbp:diseases |
gptkb:mobile_devices
computers |
gptkbp:has_type |
Trojan horse
Trojan banker Trojan downloader Trojan ransomware Trojan virus |
https://www.w3.org/2000/01/rdf-schema#label |
Trojan
|
gptkbp:is_associated_with |
financial loss
identity theft cybercrime |
gptkbp:is_atype_of |
gptkb:individuals
businesses government systems |
gptkbp:is_considered |
a form of cyber attack
a serious cybersecurity threat a type of social engineering attack |
gptkbp:is_often_seen_in |
gaming applications
file-sharing software free software downloads |
gptkbp:is_often_spread_through |
phishing attacks
social engineering tactics malicious ads |
gptkbp:is_part_of |
malware analysis
cybersecurity discussions computer security education |
gptkbp:is_targeted_at |
government agencies
business networks unsuspecting users |
gptkbp:is_used_for |
data theft
unauthorized access spying installing other malware |
gptkbp:named_after |
the Trojan Horse from Greek mythology
|
gptkbp:prevention |
gptkb:virus
firewalls user education |
gptkbp:replaces |
system restore
malware removal tools reinstalling the operating system |
gptkbp:bfsParent |
gptkb:Virginia_State_University
gptkb:Paris |
gptkbp:bfsLayer |
4
|