Skip to main content

Glossary

A B C D F H I M P R S T V W All

A Trojan is malicious software that disguises itself as a harmless program, but while performing its functions, it secretly causes damage or steals sensitive information. Trojans are usually spread in a stealth fashion, often through email attachments or fake websites. It can perform a variety of malicious activities, such as stealing data, system crashes, or even open backdoors.

A user identification method that requires two forms of identification to access resources and data. In addition to the usual username and password pair, some additional information is required to verify that the user is indeed the one trying to access the resource. This could be a fingerprint, a one-time use code sent by email or SMS, a USB or NFC key, etc. It is an additional layer of protection for user accounts, preventing unauthorised access in case of password leakage.