Get premium membership and access questions with answers, video lessons as well as revision papers.
A trap door is a quick way into a program that allows program developers to bypass all of the security built into the program now or in the future but can be exploited by criminals to gain unauthorized access to a system.
To a programmer, trap doors make sense. If a programmer needs to modify the program sometime in the future, he can use the trap door instead of having to go through all of the normal, customer-directed protocols just to make the change. Trap doors of course should be closed or eliminated in the final version of the program after all testing is complete, but, intentionally or unintentionally, some are left in place. Other trap doors may be introduced by error and only later discovered by crackers who are roaming around, looking for a way into system programs and files. Typical trap doors use such system features as debugging tools, program exits that transfer control to privileged areas of memory, undocumented application calls and parameters, and many others.
Kavungya answered the question on May 17, 2019 at 09:31
- Define Botnets.(Solved)
Define Botnets.
Date posted: May 17, 2019. Answers (1)
- Define a Ransomware.(Solved)
Define a Ransomware.
Date posted: May 17, 2019. Answers (1)
- Define Salamis.(Solved)
Define Salamis.
Date posted: May 17, 2019. Answers (1)
- Describe Logic Bombs.(Solved)
Describe Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- What is Data Diddling?(Solved)
What is Data Diddling?
Date posted: May 17, 2019. Answers (1)
- Define IP Spoofing.(Solved)
Define IP Spoofing.
Date posted: May 17, 2019. Answers (1)
- Describe Password Sniffing.(Solved)
Describe Password Sniffing.
Date posted: May 17, 2019. Answers (1)
- Define Rootkits.(Solved)
Define Rootkits.
Date posted: May 17, 2019. Answers (1)
- Define Keyloggers.(Solved)
Define Keyloggers.
Date posted: May 17, 2019. Answers (1)
- Excess Privileges.(Solved)
Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Define a Zero Day Attack.(Solved)
Define a Zero Day Attack.
Date posted: May 17, 2019. Answers (1)
- Describe social engineering.(Solved)
Describe social engineering.
Date posted: May 17, 2019. Answers (1)
- What is Pharming?(Solved)
What is Pharming?
Date posted: May 17, 2019. Answers (1)
- What is Phishing?(Solved)
What is Phishing?
Date posted: May 17, 2019. Answers (1)
- Define electronic spamming.(Solved)
Define electronic spamming.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting scanning attacks.(Solved)
Describe the ways of detecting scanning attacks.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Excess Privileges.(Solved)
Describe the ways of detecting Excess Privileges.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Data Diddling.(Solved)
Describe the ways of detecting Data Diddling.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted: May 17, 2019. Answers (1)
- Describe the ways of detecting Timing Attacks.(Solved)
Describe the ways of detecting Timing Attacks.
Date posted: May 17, 2019. Answers (1)