|
gptkbp:instanceOf
|
gptkb:malware
|
|
gptkbp:alsoKnownAs
|
gptkb:Trojan
|
|
gptkbp:canBeBypassedBy
|
gptkb:security
firewalls
|
|
gptkbp:canBeDeployedOn
|
gptkb:malware
|
|
gptkbp:canCreate
|
backdoor
|
|
gptkbp:canSteal
|
banking information
passwords
|
|
gptkbp:category
|
gptkb:cybercrime
computer security
information security
|
|
gptkbp:detects
|
gptkb:security
network monitoring
behavioral analysis
|
|
gptkbp:distinctFrom
|
gptkb:virus
gptkb:malware
|
|
gptkbp:distributedBy
|
instant messaging
peer-to-peer networks
email attachments
malicious websites
software downloads
removable media
|
|
gptkbp:doesNotSelfReplicate
|
true
|
|
gptkbp:firstDescribed
|
1970s
|
|
gptkbp:infects
|
disguised as legitimate software
social engineering
|
|
gptkbp:namedAfter
|
gptkb:Trojan_Horse_(mythology)
|
|
gptkbp:notableExample
|
gptkb:Emotet
gptkb:Back_Orifice
gptkb:Remote_Access_Trojan_(RAT)
gptkb:SpyEye
gptkb:Zeus_Trojan
|
|
gptkbp:platforms
|
gptkb:Android
gptkb:Windows
gptkb:iOS
gptkb:macOS
gptkb:Linux
|
|
gptkbp:prevention
|
do not open suspicious attachments
keep software updated
use antivirus software
avoid untrusted downloads
|
|
gptkbp:purpose
|
deceive users
gain unauthorized access
install additional malware
steal information
|
|
gptkbp:relatedTo
|
gptkb:keyboard
gptkb:malware
gptkb:rootkit
gptkb:botnet
phishing
|
|
gptkbp:removes
|
gptkb:security
malware removal tools
|
|
gptkbp:bfsParent
|
gptkb:Cavalo_de_Troia
|
|
gptkbp:bfsLayer
|
8
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Trojan horse (computing)
|