During a routine internal audit, the IT team uncovers a hidden snippet of code buried deep within the organization's payroll application. The code is programmed to automatically trigger on a specific calendar date and completely erase all employee payroll records if it activates. Which category of malicious software best describes this threat?
Logic bombs are covert code segments inserted into legitimate software that remain dormant until a predefined condition-such as a particular date, system event, or absence of a file-is met. When the trigger occurs, the bomb executes its destructive payload, like deleting records. Ransomware demands payment, Trojan horses disguise themselves to gain access, and spyware surreptitiously collects information; none rely solely on a conditional time-based trigger.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a logic bomb?
Open an interactive chat with Bash
How is a logic bomb different from a Trojan horse?
Open an interactive chat with Bash
How can organizations detect and prevent logic bombs?