The code segment that misuses its environment is called a _____________
(a) internal thief
(b) trojan horse
(c) code stacker
(d) none of the mentioned
The question was posed to me in class test.
My doubt stems from Security in chapter Protection of Operating System