Chapter 6 ACCT 392 LO 3
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
Trojan horse.
Changing data before or during entry into a computer system to delete, alter, add, or incorrectly update data is called a
data diddle.
A part of a program that remains idle until a specified date or event activates it to cause havoc is called a
logic bomb.
Spyware is
software that monitors computing habits and sends the data it gathers to someone else.
The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
superzapping.
A back door into a system that bypasses normal system controls is called a
trap door.
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
using a trap door.
Executable code that attaches itself to software, replicates itself, and spreads to other systems or files. When triggered, it makes unauthorized alterations to the way a system operates, which is called a
virus.
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
worm; virus
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
a trap door.