In a salami-slicing attack, a program performs a large number of small, hardly noticeable malicious actions, which add up to a large aggregate malicious action. In a classic example, a programmer for a bank has 1 cent of the monthly interest calculation on each bank customer's account transfered into his account. Thus, if the bank has 1,000,000 customers, then this programmer would get $10,000

each month from this salami slicing attack. What type of malware is such a program?

What will be an ideal response?


This is an insider attack, which in this case is a Trojan horse.

Computer Science & Information Technology

You might also like to view...

Which of the following is a picture effect that PowerPoint provides?

A. shadows B. reflections C. glow D. soft edges

Computer Science & Information Technology

Several processors have PGA sockets. PGA stands for

A) Particle Graphic Accelerator B) Pentium Grid Access C) Pin Grid Array D) Professional Golf Association

Computer Science & Information Technology

To create your own throwable Exception class, you must extend a subclass of Catchable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An event in a computer may be:

a. A logical decision. b. An instruction. c. An interaction such as mouse-down, key-down, etc. d. The opening of a table.

Computer Science & Information Technology