COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Worm
|
|
Virus
|
|
Trojan Horse
|
|
None of the above
|
Detailed explanation-1: -A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes.
Detailed explanation-2: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.
Detailed explanation-3: -Trojan viruses are a type of malware that invade your computer disguised as real, operational programs. Once a trojan is inside your system, it can perform destructive actions before you even know it’s there.
Detailed explanation-4: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.