This computer crime involves the secret placement or alteration of computer instructions so that the computer will tell a second computer how to perform illegal functions

It is unique in that it usually also allows the victim computer to perform most or all of the functions for its originally intended purposes. The intent of this crime is often used for inserting instructions for logic bombs, salami attacks, and viruses. What is this crime? A. Hacking
B. Scanning
C. Data diddling
D. Trojan horse


D

Criminal Justice

You might also like to view...

The "G-men" portrait arose during the Great Depression in response to criticism from the Hays Commission on pre-Depression portraits of crime

Indicate whether the statement is true or false

Criminal Justice

Several basic principles of ethics can be derived from the theories of ethics. The basic principles of ethics include:

a. nonmaleficence and beneficence. b. fidelity and veracity. c. justice and reparation. d. gratitude and confidentiality. e. all of the above.

Criminal Justice

Which of the following are reasons for adopting the war paradigm?

a. It permits the employment of warlike measures concurrently with law enforcement measures b. It enables the executive branch of government to exercise wide powers under the authority of the president as commander- in- chief c. It gives the executive the leverage to demand almost any resources in the furtherance of winning the war d. All of these

Criminal Justice

What deterrents discourage the wider use of institutional programs?

a. overcrowded institutions b. cut back on programming and treatment due to cost c. both of these choices d. neither of these choices

Criminal Justice