Top Posters
Since Sunday
g
3
2
J
2
p
2
m
2
h
2
s
2
r
2
d
2
l
2
a
2
s
2
New Topic  
whatsupgirl16 whatsupgirl16
wrote...
Posts: 425
4 years ago
There are several types of malicious code attacks that a hacker can use to gain entry into or compromise a computer system.  These are software programs that remain "silent" until a certain date or time is met.  Once these activation criteria are met, the computer system is then infected. What are these called?

▸ Trojan horses

▸ Virus

▸ Worms

▸ Logic bombs
Textbook 
Introduction to Security: Operations and Management

Introduction to Security: Operations and Management


Edition: 5th
Authors:
Read 168 times
2 Replies
Replies
Answer verified by a subject expert
jzhu11jzhu11
wrote...
Posts: 414
4 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

wrote...
2 years ago
J
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  726 People Browsing
 122 Signed Up Today
Related Images
  
 9708
  
 5
  
 5027
Your Opinion
Which industry do you think artificial intelligence (AI) will impact the most?
Votes: 308

Previous poll results: How often do you eat-out per week?