Discuss three techniques for breaching operating system controls
Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition–a matching date, e.g., Michelangelo's birthday.
You might also like to view...
Business leaders, like automaker Henry Ford, developed these programs to support the recreational and health needs of their employees.
A. Corporate citizenship programs. B. Social networking programs. C. Paternalistic programs. D. Corporate social responsibility programs.
__________ power is power based on accepted authority such as title or official position.
a. Legitimate b. Expert c. Coercive d. Referent
In 1989, Jeffrey Wigand was a scientist working for tobacco company Brown and Williamson. When he discovered that the company was adding carcinogenic substances to increase the impact of its tobacco, he was fired from his job. In 1996, he went on the TV news show 60 Minutes to reveal this information to the public. His allegations resulted in many state lawsuits that ultimately won $368 billion in settlements against the company, along with greater scrutiny of the tobacco industry. This scenario reflects Wigand's
A. whistleblowing. B. abusive supervision. C. trust propensity. D. bias suppression. E. preconventional moral reasoning.
The lowest FICO a consumer can achieve is
A) 250. B) 300. C) 400. D) 505.