FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This is the act of locating and using wireless internet connections illegally. What am i?
A
Cracking
B
Phishing
C
Hacking
D
Wardriving
E
Viruses
Explanation: 

Detailed explanation-1: -War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.

Detailed explanation-2: -A commonly cited example of the gray area around wardriving is Google’s Street View, which involves cars recording footage for interactive, online panoramas. Street View was used for wardriving by Google, which used equipment to locate local-area networks (LANs), wireless hotspots, and home Wi-Fi networks.

Detailed explanation-3: -Warbiking or warcycling is similar to wardriving, but is done from a moving bicycle or motorcycle. This practice is sometimes facilitated by mounting a Wi-Fi enabled device on the vehicle. Warwalking, or warjogging, is similar to wardriving, but is done on foot rather than from a moving vehicle.

Detailed explanation-4: -Also known as access point mapping, the objective behind wardriving is to identify vulnerable Wi-Fi networks that can be easily exploited. Wardriving has been around for a long time. Computer security researcher and consultant Pete Shipley coined the term wardriving way back in 1999.

Detailed explanation-5: -Wardriving consists of physically searching for wireless networks with vulnerabilities from a moving vehicle and mapping the wireless access points. Wardrivers will use hardware and software to find WiFi signals in a particular area. They may intend to only find a single network or every network within an area.

There is 1 question to complete.