Correct option is A
A Trojan Horse is a type of malware that appears to be a legitimate program or file, but once installed, it performs malicious activities without the user’s knowledge.
· A Trojan disguises itself as a harmless application, such as a game or utility tool.
· When downloaded and executed, it can steal data, grant unauthorized access to hackers, or damage files on the system.
Information Booster:
1. Trojan Horse:
· Named after the legendary Greek story, a Trojan Horse appears benign but contains malicious code.
· It relies on users willingly downloading or installing the software, often masquerading as useful tools or files.
· Unlike worms, it requires manual execution by the user to become active.
2. Common Effects:
· Data Theft: Stealing sensitive information like login credentials or financial data.
· System Compromise: Granting attackers remote access to the system.
· Spreading Malware: Serving as a host to install other malicious software.
3. Example: Fake antivirus software that alerts the user to fake threats and then steals personal data when installed.
Additional Knowledge:
· Time Bomb: A type of malware programmed to execute its payload at a specific time or date. Does not disguise itself as a harmless program.
· Worm: A self-replicating program that spreads across networks without needing to be disguised as a harmless program. Worms exploit vulnerabilities in network systems.
· Logic Bomb: A malicious program that activates when specific conditions are met (e.g., a certain file is opened or a program is executed). It is not disguised as a harmless program.