Approaches to handling "Trojan Horse" threats

This paper examines the exposure of an information system to an attack by a ''Trojan Horse'' and trapdoors. It outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks. It proposes models exhibit the direction and nature of the solutions for the threats.