Discuss three techniques for breaching operating system controls


Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition–a matching date, e.g., Michelangelo's birthday.

Business

You might also like to view...

Business leaders, like automaker Henry Ford, developed these programs to support the recreational and health needs of their employees.

A. Corporate citizenship programs. B. Social networking programs. C. Paternalistic programs. D. Corporate social responsibility programs.

Business

__________ power is power based on accepted authority such as title or official position.

a. Legitimate b. Expert c. Coercive d. Referent

Business

In 1989, Jeffrey Wigand was a scientist working for tobacco company Brown and Williamson. When he discovered that the company was adding carcinogenic substances to increase the impact of its tobacco, he was fired from his job. In 1996, he went on the TV news show 60 Minutes to reveal this information to the public. His allegations resulted in many state lawsuits that ultimately won $368 billion in settlements against the company, along with greater scrutiny of the tobacco industry. This scenario reflects Wigand's

A. whistleblowing. B. abusive supervision. C. trust propensity. D. bias suppression. E. preconventional moral reasoning.

Business

The lowest FICO a consumer can achieve is

A) 250. B) 300. C) 400. D) 505.

Business