Which of the following logical access exposures involves changing data before, or as it is entered into the computer?

Which of the following logical access exposures involves changing data before, or as it is entered into
the computer?

Which of the following logical access exposures involves changing data before, or as it is entered into
the computer?

A.
Data diddling

B.
Salami techniques

C.
Trojan horses

D.
Viruses

Explanation:
This kind of attack involves altering the raw data just before it is processed by a computer and then
changing it back after the processing is completed. This kind of attack was used in the past to steal
small quantities of money and transfer them to the attackers account, there are many other uses
too. Trojan horses open ports without the user knowledge to permit remote control and a Virus is a
malicious piece of code that executed inside your computer.



Leave a Reply 1

Your email address will not be published. Required fields are marked *

four × three =


Enrique Schier

Enrique Schier

Rattling superb information can be found on weblog. “The only thing you take with you when you’re gone is what you leave behind.” by John Allston.

http://www.bastcilkdoptb.com/