Suppose the author of an online banking software system has programmed in a secret feature so that program emails him the account information for any account whose balance has just gone over $10,000. What kind of attack is this and what are some of its risks?

What will be an ideal response?

This is a Trojan horse, since it has a hidden malicious action that goes with a
useful service.

Computer Science & Information Technology

You might also like to view...

A drive image is "fingerprinted" using an encryption technique called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Rotational latency is the ________

A) delay in locating the correct sector on a platter B) maximum speed of the hard drive C) time taken for the hard drive to reach full speed D) time taken to send data from the hard drive to the CPU

Computer Science & Information Technology