Trusted by millions of Kenyans
Study resources on Kenyaplex

Get ready-made curriculum aligned revision materials

Exam papers, notes, holiday assignments and topical questions – all aligned to the Kenyan curriculum.

Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.

Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.

Answers


Kavungya
Potential Offenders
Programmers who have detailed knowledge of a program.
Employees or former employees.
Vendor or contractor programmers.
Financial system programmers.
Computer users.
Computer operators.
Crackers.
Methods of Detection
Comparison of program code with backup copies of the program.
Tracing of unexpected events of possible gain from the act to suspected perpetrators.
Detailed data analysis, including analysis of program code (e.g., you may detect a virus because a file increases in size when it is modified or because disk space decreases).
Observation of financial activities of possible suspects (especially for salami attacks).
Testing of suspect programs.
Examination of computer audit logs for suspicious programs or pertinent entries (e.g., log entries that show that many programs were updated at the same time) (especially for viruses).
Transaction audits.
Evidence
Output reports.
Unexpected results of running programs.
Computer usage and file request journals.
Undocumented transactions.
Analysis test program results.
Audit logs.
Kavungya answered the question on May 17, 2019 at 08:58

Answer Attachments

Exams With Marking Schemes

Related Questions