First page Back Continue Last page Summary Graphic
A Survey of Vulnerability and Attacks
Technical Attacks
There are many types of technical attacks against the technology we use in computing.
Trojan Horse
- Hidden programs or scripts, usually embedded in an authorized program or script, that causes undesirable or unauthorized behavior when authorized program or script is executed.