A typical logic bomb tells the computer to execute a set of instructions at a certain date and time or under certain specified conditions. The instructions may tell the computer to display a message on the screen, or it may tell the entire system to start erasing itself. Logic bombs may also find their way into computer systems by way of Trojan horses. Logic bombs often work in tandem with viruses. Whereas a simple virus infects a program and then replicates when the program starts to run, the logic bomb does not replicate - it merely waits for some pre-specified event or time to do its damage.
Some bombs do their damage after a particular program is run a certain number of times.
Trojan horses present a major threat to computer systems, not just because of the damage they themselves can do, but because they provide a technique to facilitate more devastating crimes.
Kavungya answered the question on May 17, 2019 at 09:27
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trap Doors.(Solved)
Describe the ways of detecting Trap Doors.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Software Piracy.(Solved)
Describe the ways of detecting Software Piracy.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Masquerading.(Solved)
Describe the ways of detecting Masquerading.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Wiretapping and Eavesdropping.(Solved)
Describe the ways of detecting Wiretapping and Eavesdropping.
Date posted: May 17, 2019. Answers (1)