Trojan Horse
A program that contains hidden code that when invoked performs some unwanted or harmful function.
Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly
- The user may set the file permissions so that everyone can access.
Example: fake login screen.