FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Hackers usually used the computer virus for ____ purpose.
A
To log, monitor each and every user’s stroke
B
To gain access the sensitive information like user’s Id and Passwords
C
To corrupt the user’s data stored in the computer system
D
All of the above
Explanation: 

Detailed explanation-1: -A few years ago, hackers sought recognition and fame. Today, these criminals usually try to use malicious software to steal money from their victims. Viruses and worms are usually used to: Take control of your computer with the aim of using it for fraud without your knowledge.

Detailed explanation-2: -Hackers normally use data-stealing malware such as spyware and keyloggers to steal personal information. But a trojan horse virus can also be used for stealing information, such as usernames and passwords. It has the ability to copy and modify data, making it a potent tool in data theft.

Detailed explanation-3: -Some of the most famous hacking tools in the market are Nmap (Network Mapper), Nessus, Nikto, Kismet, NetStumbler, Acunetix, Netsparker, and Intruder, Nmap, Metasploit, Aircrack-Ng, etc.

Detailed explanation-4: -The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

There is 1 question to complete.