COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
virus
|
|
worm
|
|
malware
|
|
Trojan horse
|
Detailed explanation-1: -A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
Detailed explanation-2: -Trojan Spyware Alert Scams The most common is a popup technical support window that tricks unsuspecting visitors into believing their device is already infected with a Trojan virus or spyware. It then prompts them to click a link or call a number.
Detailed explanation-3: -DDoS Attack Trojan (Botnet) The attacker’s objective is to harvest as many machines as possible and use them for malicious purposes without the knowledge of the device owners-typically to flood servers with fake traffic as part of a Distributed Denial of Service (DoS) attack.
Detailed explanation-4: -A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer. RATs are often downloaded along with seemingly legitimate user-requested programs–such as video games–or are sent to their target as an email attachment via a phishing email.
Detailed explanation-5: -Here is one example of how a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.