Q8. Explain the Trojan horse.
Trojan horse or simply Trojans are unauthorized programs placed inside a legitimate application. An attacker uses a Trojan to illegitimately get access to a computer and view secret information, such as passwords, and harm the computer. Trojans are generally downloaded with some other program or application. The application runs normally after it is installed, but the user is unaware that the Trojan horse has already begun its work in the background and is silently damaging or deleting data from the computer. A Trojan is a complete program on its own and does not need any host program to attach itself to.