Discuss three techniques for breaching operating system controls


Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition–a matching date, e.g., Michelangelo's birthday.

Business

You might also like to view...

Goal programming variables include functional and deviational variables

a. True b. False

Business

Vertical analysis of financial statements is accomplished by preparing common-size statements.

Answer the following statement true (T) or false (F)

Business

A financial lease is similar to an operating lease, since

A. in both cases the lessee has the use of the asset. B. in both cases the lease has a maintenance contract. C. the lessee owns the asset. D. the lease payment is not tax deductible.

Business

When real estate itself is used to secure a debt obligation it is evidenced by a:

a. certificate of real estate b. draft c. mortgage d. credit report e. lien

Business