Distinguish between the following: Trojan horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.

What will be an ideal response?


Trojan horse: hacker back-door virus
Sniffer: intercepts and records electronic traffic
Spyware: tracking online
Trap door: allows the security safeguards to be bypassed
Logic Bomb: virus programs that contain a delay
Stealth Virus: viruses that hide inside computer memory
Phishing: fish for passwords and financial information, usually via e-mail

Criminal Justice

You might also like to view...

What is a Drug Abuse?

What will be an ideal response?

Criminal Justice

The year and a day rule is considered an outdated common law relic

Indicate whether the statement is true or false

Criminal Justice

_______________ includes crisis intervention, treatment for youths and their families, outreach, and referral to social services

Fill in the blank(s) with correct word

Criminal Justice

There can be a sense of ________ associated with working undercover because of the need to essentially betray the trust of those who have come to trust you

Fill in the blank(s) with the appropriate word(s).

Criminal Justice