Question

In: Computer Science

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?

CIA

Confidentiality - The avoidance of the unauthorized disclosure of information

Integrity - The property that information has not be altered in an unauthorized way

Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so

AAA

Assurance - How trust is provided and managed in computer systems

Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

Anonymity - The property that certain records or transactions not to be attributable to any individual

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?

Solutions

Expert Solution

Trojan Horses are malwares, it is a program designed to breach the security of a computer system while apparently performing some innocuous function.

So, Trojan horses in CIA for Confidentiality, Integrity and Availability is: -

  • Trojan Horses do not maintain Confidentiality, as it does not require permissions and disclose information.
  • Trojan Horses do not provide Integrity, Trojans can alter the data or even delete it.
  • Trojan Horses do not affect the Availability of a data, a Trojan cannot allow an unauthorized access to a given data.

Trojan Horses for AAA is as follows: -

  • Assurance cannot change the assurance of a Computer System, so Assurance is not affected by Trojans.
  • Yes, Trojan Horses can affect the Authenticity, and take permissions to change the system settings.
  • Trojans also affect the Anonymity of a system and can change the records of a data.

Trojans are viruses which enter a system and are designed so well, that they go unidentified. They do not appear to be harmful but they are.

Trojan will generally have unlimited access. It can do anything depending on the Intensions of the Attacker.

This is all for the risks associated by Trojan Horses.


Related Solutions

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by spam?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by computer viruses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by someone making so many download requests from an online music store that it prevents other users from being able to download any songs?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet). Describe the malware detection...
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet). Describe the malware detection symptoms. Describe defense in depth.
Describe how acidification acts to increase the risks to the environment and human health posed by...
Describe how acidification acts to increase the risks to the environment and human health posed by cadmium, lead and mercury. (10)
the risks being posed to the banking sector because of the Covid 19 1000 words. Give...
the risks being posed to the banking sector because of the Covid 19 1000 words. Give the main points. Write as much as you can
What is the difference between virus, worms and trojan in terms of?
What is the difference between virus, worms and trojan in terms of?What does it do?How does it spread to another computer?Does it infect the file?Does there need to be user action for it to be spread?It can be attached to.
Summarize what the effects of a Trojan horse are and how you should protect your computer...
Summarize what the effects of a Trojan horse are and how you should protect your computer system from this malware. Do you think the Trojan horse is different from or similar to a worm? Explain your reasoning.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT