Discuss three techniques for breaching operating system controls.
What will be an ideal response?
Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition-a matching date, e.g., Michelangelo's birthday.
PTS: 1
You might also like to view...
The most popular port scanner in the hacking and security community is ________
a. Portscan b. Nmap c. Servport d. NetBIOS
When you select the Link check box in the Insert Object dialog box, the object is inserted as a linked object instead of an embedded object.
Answer the following statement true (T) or false (F)