Read Time:24 Second
Description
The software appears to contain benign or useful functionality, but it also contains code that is hidden from normal operation that violates the intended security policy of the user or the system administrator.
Modes of Introduction:
– Implementation
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability: Execute Unauthorized Code or Commands
Potential Mitigations
Phase: Operation
Description:
Most antivirus software scans for Trojan Horses.
Phase: Installation
Description:
Verify the integrity of the software that is being installed.