1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
8

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.

After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?
Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
4 0

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

You might be interested in
What is a program that, when installed on a computer, records every keystroke and mouse click?
Mrac [35]
"Key logger" This could be software or hardware that does this.
6 0
3 years ago
Which type of electronic payment is typically favored in b2b?
Dennis_Churaev [7]
Electronic checks would<span> typically be favored in b2b</span>
4 0
2 years ago
What could prevent ping or traceroute responses from reaching the originating device beside network connectivity issues?
zysi [14]
Many admins set their firewalls to drop echo-request packets to prevent their networks from being mapped via "Ping Sweeps".

A remote possibility is that there's too many hops between the source and target and the packet's TTL expires.
3 0
3 years ago
Is discord down right now?
Eva8 [605]

Answer:

yes it is

Explanation:

To do this, visit discord.com and login to the web version. Once logged in using the right credentials launch the app on your PC, discord should work properly now. Ensure the system is up to date. As a last resort, uninstall and reinstall the app again.

3 0
3 years ago
Which of these words does not describe factual data
kipiarov [429]
The correct answer is "opinion".

<span>Opinions are almost never factual which is why they are opinions. </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records.
    11·1 answer
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used
    13·1 answer
  • The algorithm and flowchart
    9·1 answer
  • What is a project?
    5·2 answers
  • You can fit more RAW files on a memory card than JPEG files. true or false
    10·1 answer
  • Por favor definir que es un pseudocódigo y que es un diagrama de flujo.
    13·2 answers
  • Ken is a mobile app developer. He is designing a mobile app that offers tips and guidance to people interested in learning jazz
    8·2 answers
  • After selecting a cell in the data range, what are some ways to create a table? Check all that apply.
    5·2 answers
  • Java can be procedural or object-oriented when it comes to programming. What is the difference between procedural and OOP?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!