COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Spyware
|
|
Trojan Horses
|
|
Worms
|
|
Adware
|
Detailed explanation-1: -A Trojan horse may also be referred to as a Trojan horse virus, but is technically incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an end user’s assistance. Attackers must use social engineering tactics to trick the end user into executing the Trojan.
Detailed explanation-2: -In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
Detailed explanation-3: -Malware does the damage after it is implanted or introduced in some way into a target’s computer and can take the form of executable code, scripts, active content, and other software. The code is described as computer viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware, among other terms.
Detailed explanation-4: -Backdoor Trojans. They are one of the simplest but potentially most dangerous types of Trojan. Exploit. Rootkit. Dropper/downloader Trojans. Banking Trojans. DDoS Trojans. Fake antivirus Trojans. Trojan-GameThief. More items