COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Compression
|
|
Systemic variation
|
|
Encryption
|
|
Data Encapsulation
|
Detailed explanation-1: -Encryption is the method by which information is converted into secret code that hides the information’s true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.
Detailed explanation-2: -Black hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information.
Detailed explanation-3: -A Trojan horse, or “Trojan”, enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware.
Detailed explanation-4: -Which of the following is correct about incident response? The goal of an incident response plan is to handle the situation in a way that limits damage and reduces recovery time and costs.