COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Someone sneezing near your computer
|
|
A zombie bit your computer
|
|
Your firewall broke
|
|
Usually by a Trojan
|
Detailed explanation-1: -Computers can be co-opted into a botnet when they execute malicious software. This can be accomplished by luring users into making a drive-by download, exploiting web browser vulnerabilities, or by tricking the user into running a Trojan horse program, which may come from an email attachment.
Detailed explanation-2: -Botnet infections are usually spread through malware or spyware. Botnet malware is typically designed to automatically scan systems and devices for common vulnerabilities that haven’t been patched in hopes of infecting as many devices as possible.
Detailed explanation-3: -A botnet attack is a form of cyberattack that happens when a group of internet-connected devices is infected by malware that is under control by a malicious hacker. Botnet attacks typically involve sending spam, data theft, exploiting sensitive information, or launching vicious DDoS attacks.
Detailed explanation-4: -Data breach perpetrated via botnets A ZeuS botnet attack occurred in 2007, is considered one of the most notorious attacks in history. It was first intended to obtain end-user banking information via spam or phishing emails. The attacker used a Trojan horse application distributed via a botnet to infect the devices.
Detailed explanation-5: -A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot.