[ZDP] BackTalk to Document The Zope Book (2.5 Edition)/Users and Security
webmaster@zope.org
webmaster@zope.org
Mon, 23 Sep 2002 20:12:11 -0400
A comment to the paragraph below was recently added via http://www.zope.org/Documentation/Books/ZopeBook/current/Security.stx#3-100
---------------
The basic scenario that motivates both ownership and executable
content controls is a *Trojan horse* attack. A Trojan horse is
an attack on a system that operates by tricking a user into
taking a potentially harmful action. A typical Trojan horse
masquerades as a benign program that causes harm when you
unwittingly run it.
% Anonymous User - Sep. 23, 2002 8:12 pm:
The attacker lacks permission to run the program himself, but tricks someone authorized to run it.