Final answer:
The characteristic that describes a Trojan horse in relation to computer security is malicious software or code running on an end device.
Therefore, the correct answer is: option "malicious software or code running on an end device"
Step-by-step explanation:
A Trojan horse is malicious software disguised as legitimate, used by hackers to infiltrate systems, often to steal data or cause harm. It is one of many methods used by attackers to compromise networks and devices. Unlike viruses or worms, a Trojan horse disguises itself as a legitimate program to deceive users into executing it.
Once inside the system, it can conduct a variety of activities, which might include stealing credentials, installing backdoors, or damaging the system in some manner.
Hackers use Trojan horses as one of their methods to break into systems and networks, often with the intent of exfiltrating private data or causing harm. As such, protecting against Trojan horses usually involves a combination of cybersecurity best practices and antimalware applications.