Logic bombs in Cyber Security.Full Explanation.

 


WHAT IS A LOGIC BOMBS?

-Logic bombs are small programs or section of a program triggered by some event such as a certain date or time,certain percentage of disk space filled,the removal of a file and so on. For example ,a programmer could establish a logic bomb to delete critical sections of code if she is terminated from the company.Logic bombs are most commonly installed by insiders with access to the system.


-Logic bomb is malware that is triggered by a response to an event,such as launching an application or when a specific date\time is reached.Attackers can use logic bombs in a variety of ways.They can embed arbitrary code within a fake application or Trojan horse and will be executed whenever you launched the fraudulent software.


-Attackers can also use a combination of spyware and logic bombs in attempt to steal your identity.For example cyber-criminals use spyware to covertly install a key-logger on your computer.the key-logger can capture your keystrokes.


-Logic bombs are difficult to prevent because can be deployed from almost anywhere.An attacker can plant the logic bombs via a variety of means on multiple platforms,such as hiding the malicious code in a scripts or deploying it on a SQL server.


-For organization,segregation of duties might offer protection against logic bombs.By restricting employ to specific tasks,a potential attacker will be exposed to carry out the logic bombs deployment,which may deter the subject to carry out the attack.


-Most organization implement a business continuity and disaster recovery plan that includes processes such as data backups and recovery.If a logic bombs attack were to purge critical data,the organization can enforce the disaster recovery plan and follow the necessary steps to recover from the attack.


-Some logic bombs can be detected and eliminated before they execute through a periodic scan of all computer files including impressed files,with an up to date anti-virus programs.

-For best results ,the auto-protect and e-mail screening function of the anti-virus program should be activated by the the computer user whenever the machine is online.In a network each computer should be individually protected in addition to whatever protection is provided by the network administrator.unfortunately,even this precaution does not guarantee 100-percent system immunity. 




No comments:

Post a Comment