HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.224 Precautions against Trojan horses

S 2.224 Precautions against Trojan horses

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrators, employees

A Trojan horse is a program containing a damaging function which is covertly embedded in another program. Trojan horses are spread by being integrated into host programs that are as "attractive" as possible and are then, for example, offered for download or sent as e-mail attachments. As well as causing damage directly, Trojan horses can be used to enable outsiders to gather information not only about this particular computer but also about the local network.

It is difficult to protect oneself against Trojan horses as they can be concealed in many different kinds of files. It is therefore important to keep reminding all users about the problem of Trojan horses. Important procedural rules in this area are provided below.

It is also recommended checking the storage media used regularly for unexpected alterations (new or amended files, unusual behaviour).


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home