Systems Security Certified Practitioner – SSCP – Question0110

Which of the following logical access exposures INVOLVES CHANGING data before, or as it is entered into the computer?

A.
Data diddling
B. Salami techniques
C. Trojan horses
D. Viruses

Correct Answer: A

Explanation:

It involves changing data before , or as it is entered into the computer or in other words , it refers to the alteration of the existing data.
The other answers are incorrect because :
Salami techniques : A salami attack is the one in which an attacker commits several small crimes with the hope that the overall larger crime will go unnoticed.
Trojan horses: A Trojan Horse is a program that is disguised as another program. Viruses:A Virus is a small application , or a string of code , that infects applications.
Reference: Shon Harris , AIO v3
Chapter -11: Application and System Development, Page : 875-880 Chapter -10: Law, Investigation and Ethics , Page : 758-759