FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ are malicious instructions that appear as legitimate programmes, mostly arriving via email or infected websites.
A
Ransomware
B
Worms
C
Trojans
D
Spyware
Explanation: 

Detailed explanation-1: -Trojans masquerade as legitimate programs, but they contain malicious instructions. They’ve been around forever, even longer than computer viruses, but have taken hold of current computers more than any other type of malware. A Trojan must be executed by its victim to do its work.

Detailed explanation-2: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Detailed explanation-3: -Trojan viruses are a type of malware that invade your computer disguised as real, operational programs. Once a trojan is inside your system, it can perform destructive actions before you even know it’s there.

Detailed explanation-4: -Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan. Virus. Virus is a program written to enter to your computer and damage/alter your files/data.

Detailed explanation-5: -Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches, or they may be embedded in attachments included in phishing emails.

There is 1 question to complete.