COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
IP Spoofing
|
|
Email Spoofing
|
|
IP Stealing
|
|
Phishing
|
Detailed explanation-1: -IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with a phony Web site.
Detailed explanation-2: -A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
Detailed explanation-3: -An acceptable use policy, also known as an AUP, is a kind of agreement that outlines the appropriate use of access to a company’s network or the internet by detailing what users may or may not do when utilizing these platforms.