![In the Tim Lloyd logic bomb attack on Omega Engineering, what type of vulnerability was the existence of the user "12345" an example of? | Homework.Study.com In the Tim Lloyd logic bomb attack on Omega Engineering, what type of vulnerability was the existence of the user "12345" an example of? | Homework.Study.com](https://homework.study.com/cimages/videopreview/videopreview-full/thumbnail-what-is-a-computer-virus_117049.jpg)
In the Tim Lloyd logic bomb attack on Omega Engineering, what type of vulnerability was the existence of the user "12345" an example of? | Homework.Study.com
![IS4463 Secure Electronic Commerce 5:30-6:45 PM Robert Kaufman –Background –Contact information Syllabus and Class Schedule Student Background Information. - ppt download IS4463 Secure Electronic Commerce 5:30-6:45 PM Robert Kaufman –Background –Contact information Syllabus and Class Schedule Student Background Information. - ppt download](https://images.slideplayer.com/25/7874297/slides/slide_7.jpg)
IS4463 Secure Electronic Commerce 5:30-6:45 PM Robert Kaufman –Background –Contact information Syllabus and Class Schedule Student Background Information. - ppt download
![Today In Infosec on Twitter: "2006: The Forensic Files episode "Hack Attack" aired. It covered a logic bomb activated in 1996 at Omega Engineering, for which Tim Lloyd was later convicted. https://t.co/EJqXp5F9kX" / Today In Infosec on Twitter: "2006: The Forensic Files episode "Hack Attack" aired. It covered a logic bomb activated in 1996 at Omega Engineering, for which Tim Lloyd was later convicted. https://t.co/EJqXp5F9kX" /](https://pbs.twimg.com/media/DmTpZfbWwAAVswD.jpg)