COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
encryptor
|
|
online predator
|
|
firewall
|
|
computer security
|
Detailed explanation-1: -How do Bot herders create botnets? Launching programs that search the Internet for computers with inadequate security and install software robot programs, called bots, on these vulnerable systems.
Detailed explanation-2: -Encryption is a process that renders data unreadable to anyone except those who have the appropriate password or key. By encrypting sensitive files (by using file passwords, for example), you can protect them from being read or used by those who are not entitled to do either.
Detailed explanation-3: -Hackers may create programs that search for unprotected pathways into network systems and computers. Hackers may gain backdoor access by infecting a computer or system with a Trojan horse, created by hackers to acquire and steal important data without the victim noticing.
Detailed explanation-4: -An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused.