1. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
(Source: RFC 2828)
2. [A] program containing hidden code allowing the unauthorized collection, falsification, or destruction of information.
(Source: ATIS) |