COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Group of compromised computers or mobile devices connected to a network, such as the Internet, that is used to attack other networks, usually for nefarious purposes
|
Backdoor
|
|
Botnet
|
|
Firewall
|
|
Spoofing
|
Explanation:
Detailed explanation-1: -In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker.
Detailed explanation-2: -A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot.
There is 1 question to complete.