COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Worm
|
|
Spyware
|
|
Trojan
|
|
None of the above
|
Detailed explanation-1: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Detailed explanation-2: -A Virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data. Trojan Horse is a form of malware that captures some important information about a computer system or a computer network. Antivirus softwares are used for protection against viruses.
Detailed explanation-3: -Here is one example of how a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.
Detailed explanation-4: -A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.
Detailed explanation-5: -A Trojan virus on a computer, or simply a Trojan, is a malicious software program or code masquerading as legitimate and harmless software. Once it infects a device, it executes its task, which may include deleting or modifying data, stealing data, installing additional malware, and disrupting system performance.