Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 2 /

Logic Bomb

Logic bomb is a term that is mostly used in the topic of computer program. Slag code is sometimes used in order to refer to this piece of code as well. Logic bomb is a programming code that is sneakily introduced into a software system by a vicious criminal with a hidden agenda. This code will then activate a malicious operation once it meets the precise requirements.
A logic bomb is created in such a way that it will only be executed within the systems due to events like: a delay in time and inability of a user to respond to a certain program command. This occurs along with the elements such as computer viruses and Trojan horses, which are all designed to react to an interruption in the action within a machine. A sample situation goes wherein a code that is incorporated by a malicious programmer into a system will only begin erasing certain files like a salary database trigger once these are ceased  from the company.

Most of the time, the pieces of malicious software

Including worms and viruses are injected with a generous amount of logic bombs. These codes launch payload at a pre-defined time or once the circumstances are already acquired.
A code may be considered as a logic bomb only when the payload is unnecessary and unfamiliar to the software’s user. For example, the codes in trial programs which functions in the deactivation of a product after reaching a certain period of time may not be considered as logic bombs.
This device has been intelligently-created since viruses and worms can easily utilize the code in order to obtain the amount of momentum that they need. And, upon acquiring the desired impetus, their distribution will become easier and it will also occur more discreetly.
There are also fixed dates as to when the attacks are officiated by viruses against the host systems. The dates include both the Friday the 13th as well as April Fool’s day. The term “time bombs” are often used when referring to Trojans that are executed only on specific dates.
 Utm firewall Appliance 

➤ Related pages
Aircrack
Application Security
Black box
Blind SQL Injection
Blue box
Global System for Mobile GSM
Hacker
Internet Filter
Logic Attack
Logic Bomb
Malware
Man in the Middle Attack
PCI-DSS Compliance
Red box
Server Spam Filter
Shoulder Surfing
Wardriving
What is 2600?
What is a Botnet?
What is SANS Top 20?
What is vlan tagging?
What is Wimax?
What is Zero Day?

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef