COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Someone attacks a network with malware.
|
|
Someone from inside an organisation uses the network to steal information.
|
|
Someone monitors data travelling on the network to steal information.
|
|
None of the above
|
Detailed explanation-1: -Eavesdropping. Eavesdropping occurs when an attacker intercepts sensitive information by listening to phone calls or reading unencrypted messages exchanged in a communication medium. Although eavesdropping is similar to snooping, snooping is limited to gaining access to data during transmission.
Detailed explanation-2: -Passive attacks are a type of cyberattack that involves the use of malicious software, such as spyware, malware, and other malicious programs. Spyware is a type of software that is installed on a system or network to collect information about the user or system without their knowledge.
Detailed explanation-3: -Confidentiality is the protection of transmitted data from passive attacks. With respect to the content of a data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period of time.
Detailed explanation-4: -In an active attack, Victim gets informed about the attack. While in a passive attack, Victim does not get informed about the attack. In an active attack, System resources can be changed. While in passive attack, System resources are not changing.
Detailed explanation-5: -A passive attack may be a system attack that doesn’t end in a change to the system in any way. During this attack, the attacker doesn’t get to communicate with the system. Instead, he/she passively monitors or records the info passing over the channel to and from the system.