What type of attacks occurs when a rogue application has been planted - ProProfs Discuss
Advertisement

What type of attacks occurs when a rogue application has been planted on an unsuspecting users workstation?

Asked by Wyatt Williams, Last updated: Apr 11, 2024

+ Answer
Request
Question menu
Vote up Vote down

1 Answer

Wyatt Williams

Wyatt Williams

Wyatt Williams
Wyatt Williams

Answered Mar 08, 2018

Trojan Horse attacks

Trojan Horse attacks - This attack involves a rogue, Trojan horse application that has been planted on an unsuspecting users workstation. The Trojan horse waits until the user submits a valid PIN from a trusted application, thus enabling usage of the private key, and then asks the smartcard to digitally sign some rogue data. The operation completes but the user never knows that their private key was just used against their will. Physical attacks involve physical access to hardware such as a network cable or keyboard. Social engineering attacks are based on taking advantage of human interaction rather than technology itself. (Frequently, social engineering attacks dont even require access to a computer.) There is no such thing as a logical attack, although many attacks do involve the use of logic to figure out how an application works and where its security vulnerabilities may be.
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.