167k views
5 votes
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using a. a Trojan horse. b. the salami technique. c. superzapping. d. a trap door.

User Morgon
by
7.0k points

1 Answer

5 votes

Answer:

a trap door.

Step-by-step explanation:

A trap door or back door is an undocumented or fraudulent way of gaining access to a system that is built into the system by its designer during the development process thereby allowing access into the system that bypasses normal system controls.

User Akarun
by
5.4k points