Discuss three techniques for breaching operating system controls.
What will be an ideal response?
Browsing involves searching through areas of main memory for password information.
Masquerading is a technique where a user is made to believe that he/she has accessed the operating system and therefore enters passwords, etc., that can later be used for unauthorized access.
A virus is a program that attaches itself to legitimate software to penetrate the operating system. Most are destructive.
A worm is software that replicates itself in memory.
A logic bomb is a destructive program triggered by some "logical" condition-a matching date, e.g., Michelangelo's birthday.
PTS: 1
You might also like to view...
The ____ calendar item status option shows time with a purple bar in Day, Week, Work Week, or Month view.
A. Free B. Tentative C. Out of Office D. Busy
With selectors, a ____ serves as a flag character and separates the element selector from the name of the dependent class.
A. comma B. period C. space D. question mark
A Framework is a process or structure with no set definition.
Answer the following statement true (T) or false (F)
The separation of a service from the entity (or entities) providing that service is called ____.
virtualization networking itemization gap computing