COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
were designed to lie dormant until a specific logical condition is met
|
|
tracks users’ keystrokes, obtains passwords, and other personal information
|
|
is an entry point into a program without it knowing
|
|
go KABOOM
|
Detailed explanation-1: -A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.
Detailed explanation-2: -A logic bomb is a piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious.
Detailed explanation-3: -A logic bomb is a malicious piece of code that’s secretly inserted into a computer network, operating system, or software application. It lies dormant until a specific condition occurs.
Detailed explanation-4: -If the trigger is related to a date or time, the logic bomb will go off on a certain date–e.g., Y2K–and is known as a time bomb. Its payload refers to the specific component that’s programmed to cause damage, such as deleting files, sending spam emails and stealing data.
Detailed explanation-5: -Ransomware can remain dormant on a device until the device is at its most vulnerable, and only then execute an attack.