Eve installed some spyware software on 100 USB flash drives and has designed this software to autoload from these drives along with some nude photos. She then painted the logo of a well-known adult magazine on each one and randomly scattered these flash drives in the parking lots of several of the big defense companies in her town. What type of malware attack is this and what vulnerability is she
trying to exploit in order to get her malware code past the network firewalls of these companies?
What will be an ideal response?
This is a Trojan horse attack, since the users are probably expecting the nude
photos, given the logo, but are not expecting the spyware. Eve is trying to get employees
of these companies to insert these USB flash drives in their company computers (inside the
firewall) and exploit a vulnerability of having auto-execution enabled, so that the spyware
autoloads along with the expected nude photos.
You might also like to view...
Answer the following statements true (T) or false (F)
1. The preprocessor reads a program before it is compiled and only executes those lines beginning with # symbol. 2. Because C++ is case-sensitive, all programs must have a function called main or Main. 3. In programming, the terms "line" and "statement" always mean the same thing. 4. In C++, key words are written in all lowercase letters. 5. The preprocessor executes after the compiler.
A home computer with Internet access is considered a Web client.
Answer the following statement true (T) or false (F)
A wavy ________ line indicates a possible contextual spelling error when checking spelling within Word
Fill in the blank(s) with correct word
In the figure above, which number points to the document type?
A. 1 B. 2 C. 5 D. ?6