Changes

Jump to: navigation, search
Logic Bombs
== Logic Bombs ==
 
Logic bombs are usually used by disgruntled employees to destroy data after they have left a company. They involve installing a hidden program on a system that is designed to activate at a pre-defined date and time. Once activated they can wreak havoc on entire networks.
 
Frequent auditing of system activity and the use of third party consultants to review code are the only ways to effectively prevent the possibility of a logic bomb being planted by an employee. The use of activity logging will also be essential when performing forensics after a logic bomb has ''detonated'' is also invaluable when prosecuting the offender in court.
 
== Worms ==
 
A worm is a form of virus that is able to replicate itself between machines a network. For example, a worm will find its way onto one system and the exploit known security holes to propogate copies of itself to any other systems it can find. Because worms replicate so effectively they can be difficult to eradicate. After the worm has been removed from system on a network it is simply replaced by the in instance of the worm on another system on the network.
 
== Social Engineering ==

Navigation menu