asked 167k views
5 votes
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.

asked
User Morgon
by
8.8k points

1 Answer

5 votes

Answer:

a trap door.

Step-by-step explanation:

A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.

answered
User Akarun
by
7.4k points