Which of the following logical access exposures involves changing data before, or as it is entered into
the computer?
A.
Data diddling
B.
Salami techniques
C.
Trojan horses
D.
Viruses
Explanation:
This kind of attack involves altering the raw data just before it is processed by a computer and then
changing it back after the processing is completed. This kind of attack was used in the past to steal
small quantities of money and transfer them to the attackers account, there are many other uses
too. Trojan horses open ports without the user knowledge to permit remote control and a Virus is a
malicious piece of code that executed inside your computer.
Rattling superb information can be found on weblog. “The only thing you take with you when you’re gone is what you leave behind.” by John Allston.
http://www.bastcilkdoptb.com/
0
0