Suppose the author of an online banking software system has programmed in a secret feature so that program emails him the account information for any account whose balance has just gone over $10,000. What kind of attack is this and what are some of its risks?
What will be an ideal response?
This is a Trojan horse, since it has a hidden malicious action that goes with a
useful service.
Computer Science & Information Technology
You might also like to view...
A(n) ________ is any disk drive, folder, or other place where you can store files and folders
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ROUND function requires how many arguments?
A) 4 B) 3 C) 1 D) 2
Computer Science & Information Technology
An administrator installs a device that can detect and throttle peer-to-peer traffic. Which of the following device types is being installed?
A. Bandwidth shaper B. Intrusion detection C. Proxy server D. Load balancer
Computer Science & Information Technology
The scale of a vertical axis is chosen automatically to fit the largest value selected
Indicate whether the statement is true or false
Computer Science & Information Technology