PrepAway - Latest Free Exam Questions & Answers

Which of the following logical access exposures involve…

Which of the following logical access exposures involvers changing data before, or as it is entered into the
computer?

PrepAway - Latest Free Exam Questions & Answers

A.
Data diddling

B.
Salami techniques

C.
Trojan horses

D.
Viruses

Explanation:
Data diddling refers to the alteration of existing data. Many times, this modification happens before the data is
entered into an application or as soon as it completes processing and is outputted from an application. For
instance, if a loan processor is entering information for a customer’s loan of $100,000, but instead enters
$150,000 and then moves the extra approved money somewhere else, this would be a case of data diddling.
Another example is if a cashier enters an amount of $40 into the cash register, but really charges the customer
$60 and keeps the extra $20.
This type of crime is extremely common and can be prevented by using appropriate access controls and proper
segregation of duties. It will more likely be perpetrated by insiders, who have access to data before it is
processed.
Incorrect Answers:
B: Salami techniques: A salami attack is the one in which an attacker commits several small crimes with the
hope that the overall larger crime will go unnoticed. This is not what is described in the question.
C: A Trojan Horse is a program that is disguised as another program. This is not what is described in the
question.
D: A Virus is a small application or a string of code that infects applications. This is not what is described in the
question.

Harris, Shon, All In One CISSP Exam Guide, 6th Edition, McGraw-Hill, 2013, p. 1059


Leave a Reply