Trap doors and Logic Bombs, Basic Computer Science

Assignment Help:

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  


Related Discussions:- Trap doors and Logic Bombs

Introduction to FCB , There are two kinds of FCB, the normal, whose length...

There are two kinds of FCB, the normal, whose length is 37 bytes and the expanded one of 44 bytes. The FCB is created of data given by the programmer and by data which it takes dir

Cisc, two characteristics og CISC architecture?

two characteristics og CISC architecture?

M s word., explain the steps to form a colourful card

explain the steps to form a colourful card

Data processing, Data Processing In any computer-based system, d...

Data Processing In any computer-based system, data storage and retrieval plays an important role. Data storage involves decision about the encoding of data, assignment o

Software basics, SOFTWARE BASICS: Software is a generic term covering ...

SOFTWARE BASICS: Software is a generic term covering the concepts, procedures and instructions which cause the computer systems to accomplish the required job, Generally, soft

What are the features of microprocessor ?, Previously two sections the fund...

Previously two sections the fundamentals of the workings and architecture of the central processing unit has been explained. There has been a common look at easy processor architec

Use Decision Tree Technique to Optimize Institution’s Studen, Use Decision ...

Use Decision Tree Technique to Optimize Institution’s Student Admission Process– A Case Study

Microprocessor, what is computer mapped input / output

what is computer mapped input / output

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd