× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
5
o
5
4
m
4
b
4
x
4
a
4
l
4
t
4
S
4
m
3
s
3
New Topic  
jmoney5 jmoney5
wrote...
Posts: 470
4 years ago
There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system.  In this type of malicious code attack, a user launches a non-replicating malware program:

▸ Trojan horse

▸ Virus

▸ Worm

▸ Logic bomb
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 143 times
2 Replies

Related Topics

Replies
wrote...
4 years ago
Trojan horse
jmoney5 Author
wrote...
4 years ago
Thanks
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  745 People Browsing
 112 Signed Up Today
Related Images
  
 246
  
 10096
  
 421
Your Opinion
Which industry do you think artificial intelligence (AI) will impact the most?
Votes: 308