A logic bomb is a type of trojan program used to

Info icon This preview shows pages 3–5. Sign up to view the full content.

A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program. Chris Sparkman Chapter Journal Set 2 | 3
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

A backdoor , also called a trapdoor, is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files. A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. A denial-of-service attack floods a network or server with service requests to prevent legitimate users’ access to the system. DoS attackers target Internet servers (usually Web, FTP, or mail servers), although any system connected to the Internet running TCP services is subject to attack. Recently, emergency-service providers and many other organizations have been targeted by a new type of DoS attack, called a TDoS (telephony denial of service) attack. These attacks use high volumes of automated calls to tie up a target phone system, halting incoming and outgoing calls. In the context of security, social engineering means using “people skills” such as being a good listener and assuming a friendly, unthreatening air to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems. Two commonly used social-engineering techniques are called dumpster diving and shoulder surfing . Social engineers often search through dumpsters or trash cans looking for discarded material (such as phone lists and bank statements) that they can use to help break into a network. Shoulder surfing is looking over someone’s shoulder and is the easiest form of collecting information. Security Measures and Enforcement: An Overview A comprehensive security system should include biometric security measures, nonbiometric security measures, physical security measures, access controls, virtual private networks, data encryption, e-commerce transaction security measures, and a computer emergency response team. Biometric security measures use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others. Some drawbacks of biometrics are high cost, users’ reluctance, and complex installation, but they can be a viable alternative to traditional security measures. The three main nonbiometric security measures are callback modems, firewalls, and intrusion detection systems.
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '16
  • seancollins
  • Business, Computer network, Chris Sparkman, Chapter Journal Set, Chris Sparkman Chapter, Sparkman Chapter Journal

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern