expand for answer

Logic Bomb

A Trojan horse that will trigger when a specific logical event or action occurs. Malicious code objects that infect a system and lie dormant until they are triggered by the occurrence of one or more conditions.


Similar items:
A computer program that is apparently or actually useful and contains a trapdoor or unexpected code. A malicious code object that appears to be a benevolent program, such as a game or simple utility that performs the “cover” functions as advertised but also carries an unknown payload, such as a virus. Program containing hidden code allowing the unauthorized collection, falsification, or destruction of information. (. See malicious code. )
[view]
Code objects that include a broad range of programmed computer security threats that exploit various network, operating system, software, and physical security vulnerabilities to spread malicious payloads to computer systems. Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. (. See Trojan horse. )
[view]
A type of malicious software that can destroy the computer’s hard drive, files, and programs in memory, and that replicates itself to other disks. Selfreplicating, malicious code that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence. The oldest form of malicious code objects that plague cyberspace. Once they are in a system, they attach themselves to legitimate operating system and user files and applications
[view]
An object is highly cohesive if it can perform a task with little or no help from other objects. Highly cohesive objects are not as dependent on other objects as objects with lower cohesion. Objects with higher cohesion are often better. Highly cohesive objects perform tasks alone and have low coupling.
[view]
A Trojan horse that will trigger when a particular time or date is reached. Resident computer program that triggers an unauthorized act at a predefined time.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in