FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Gaining the trust of individuals or organisations to influence them to give confidential information.
A
Cryptolock
B
Botnet
C
DDOS
D
Social Engineering
Explanation: 

Detailed explanation-1: -By masquerading as legitimate users to IT support personnel, they grab your private details-like name, date of birth or address. From there, it’s a simple matter to reset passwords and gain almost unlimited access. They can steal money, disperse social engineering malware, and more.

Detailed explanation-2: -Phishing attacks are a subset of social engineering strategy that imitate a trusted source and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.

Detailed explanation-3: -Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples.

There is 1 question to complete.