COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
Botnet
|
|
Firewall
|
|
Password
|
|
Spoofing
|
Explanation:
Detailed explanation-1: -Phishing attacks often involve creating fake links that appear to be from a legitimate organization. These links may use misspelled URLs or subdomains to deceive the user.
Detailed explanation-2: -Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its connection.
There is 1 question to complete.