COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
| Question 
 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
 | 
|  |  IP Spoofing 
 | 
|  |  Email Spoofing 
 | 
|  |  IP Stealing 
 | 
|  |  Phishing 
 | 
Detailed explanation-1: -IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with a phony Web site.
Detailed explanation-2: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Detailed explanation-3: -An acceptable use policy, also known as an AUP, is a kind of agreement that outlines the appropriate use of access to a company’s network or the internet by detailing what users may or may not do when utilizing these platforms.