ISC Exam Questions

What type of attacks occurs when a rogue application has been planted on an unsuspecting user’s wo

What type of attacks occurs when a rogue application has been planted on an unsuspecting user’s
workstation?

A.
Physical attacks

B.
Logical attacks

C.
Trojan Horse attacks

D.
Social Engineering attacks

Explanation:
Trojan Horse attacks – This attack involves a rogue, Trojan horse application that has
been planted on an unsuspecting user’s workstation. The Trojan horse waits until the
user submits a valid PIN from a trusted application, thus enabling usage of the private
key, and then asks the smartcard to digitally sign some rogue data. The operation
completes but the user never knows that their private key was just used against their
will.