Discuss three techniques for breaching operating system controls.

What will be an ideal response?


Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition-a matching date, e.g., Michelangelo's birthday.

PTS: 1

Computer Science & Information Technology

You might also like to view...

The ____ calendar item status option shows time with a purple bar in Day, Week, Work Week, or Month view.

A. Free B. Tentative C. Out of Office D. Busy

Computer Science & Information Technology

With selectors, a ____ serves as a flag character and separates the element selector from the name of the dependent class.

A. comma B. period C. space D. question mark

Computer Science & Information Technology

A Framework is a process or structure with no set definition.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The separation of a service from the entity (or entities) providing that service is called ____.

virtualization networking itemization gap computing

Computer Science & Information Technology