Chapter 6 ACCT 392 LO 3

Ace your homework & exams now with Quizwiz!

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

Trojan horse.

Changing data before or during entry into a computer system to delete, alter, add, or incorrectly update data is called a

data diddle.

A part of a program that remains idle until a specified date or event activates it to cause havoc is called a

logic bomb.

Spyware is

software that monitors computing habits and sends the data it gathers to someone else.

The unauthorized use of special program that bypass regular system controls to perform illegal acts is called

superzapping.

A back door into a system that bypasses normal system controls is called a

trap door.

A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

using a trap door.

Executable code that attaches itself to software, replicates itself, and spreads to other systems or files. When triggered, it makes unauthorized alterations to the way a system operates, which is called a

virus.

A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.

worm; virus

Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

a trap door.


Related study sets

Life and Health Insurance ExamFX

View Set

Business Ethics Test #2 Chapter 5

View Set

Chapter 1: Introduction to Environmental Science

View Set

Preparing Effective business plans

View Set

Abdomen: Peritoneum and Peritoneal cavity

View Set