COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Virus
|
|
Worm
|
|
Trojan horse
|
|
Denial-of-service attack
|
Detailed explanation-1: -A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
Detailed explanation-2: -A Trojan horse, or Trojan, is software that is intended to perform, simultaneously, a desirable (expected) effect and a covert (unexpected) effect. Trojan horses can make copies of themselves, steal information, or harm the computer system.
Detailed explanation-3: -A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves.