Which of the following logical access exposures INVOLVES CHANGING data before, or as it is entered into the computer?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
It involves changing data before , or as it is entered into the computer or in other words , it refers to the alteration of the existing data.
The other answers are incorrect because : Salami techniques : A salami attack is the one in which an attacker commits several small crimes with the hope that the overall larger crime will go unnoticed.
Trojan horses: A Trojan Horse is a program that is disguised as another program.
Viruses:AVirus is a small application , or a string of code , that infects applications.
The logical access exposure that involves changing data before or as it is entered into the computer is known as Data Diddling.
Data Diddling is a form of computer crime where an attacker modifies data before or during input, processing, transmission, or storage. This type of attack usually involves altering data in a way that is difficult to detect, with the goal of gaining unauthorized access or causing harm to the system.
Data Diddling attacks can be performed by individuals who have authorized access to the system or by external attackers who gain unauthorized access. For example, an employee with access to the system may modify data to cover up fraudulent activity or to create false records, while an external attacker may modify data to steal sensitive information or to disrupt business operations.
Salami techniques, Trojan horses, and viruses are all types of malicious software that can be used to carry out attacks on computer systems. Salami techniques involve stealing small amounts of data from many different sources over a period of time, while Trojan horses and viruses are both forms of malware that can be used to gain unauthorized access to a system or to damage data.
In summary, the correct answer to the question is A. Data Diddling. This type of attack involves changing data before or during input, processing, transmission, or storage, and is a common form of computer crime that can be carried out by both internal and external attackers.