COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Phishing
|
|
Rootkit
|
|
Spyware
|
|
Virus
|
|
Worm
|
Detailed explanation-1: -Angler phishing. A relatively new attack vector, social media offers several ways for criminals to trick people. Fake URLs; cloned websites, posts, and tweets; and instant messaging (which is essentially the same as smishing) can all be used to persuade people to divulge sensitive information or download malware.
Detailed explanation-2: -Phishing-Attempts to convince people to divulge sensitive information. Examples include receiving an email from their bank asking users to divulge their account and PIN numbers. Rootkits-Installed on a compromised system.
Detailed explanation-3: -Worm Malware – Self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks.
Detailed explanation-4: -Definition(s): A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
Detailed explanation-5: -The main purpose of rootkits is to mask malware payloads effectively and preserve their privileged existence on the system. For that reason, a rootkit will conceal files, malware processes, injected modules, registry keys, user accounts or even system registries running on system boot.