Page 1454 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1454
worms, logic bombs, and Trojan horses. We’ll then take a look at some
of the other security exploits used by someone attempting to gain
unauthorized access to a system or to prevent legitimate users from
gaining such access.