COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Virus
|
|
Trojan
|
|
Worm
|
|
Ransomware
|
|
Spyware (Key Logger)
|
Detailed explanation-1: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
Detailed explanation-2: -Adware is one of the most profitable, least harmful forms of malware and is becoming increasingly popular on mobile devices. Adware generates revenue by automatically displaying advertisement to the user of the software.
Detailed explanation-3: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Detailed explanation-4: -Examples of Malicious Code Attacks Some of the better-known examples of malicious attacks include: Trojan Horse – Emotet – appears as applications a user would benefit from. Worms – Stuxnet – replicated through network computers.
Detailed explanation-5: -Worm: A program that replicates itself and destroys data and files on the computer. Worms work to “eat” the system operating files and data files until the drive is empty. Trojan: A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software.