Explain how a user could be fooled into running a Trojan. (2)

1. Social Engineering: A user can be tricked into running a Trojan via social engineering. For example, an attacker can send an email claiming to be from a legitimate source, and ask the user to click on a link or open an attachment. The link or attachment may contain the Trojan, disguised as a harmless file, and the user may unwittingly run it.

2. Masquerading: A Trojan can be disguised as a legitimate program or file, deceiving the user into thinking that it is safe to run. For instance, a Trojan may be disguised as an antivirus update, and the user may believe that they are installing a legitimate update. However, the Trojan can then install malware on the user’s computer without their knowledge, compromising their security.