COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following security threats secretly accesses a user’s computer, acts without a user’s knowledge and changes the operations for malicious intents
A
Cyber attack
B
Malware
C
Online scams and frauds
D
Botnets
Explanation: 

Detailed explanation-1: -Spyware. Spyware collects information about users’ activities without their knowledge or consent. This can include passwords, pins, payment information and unstructured messages. The use of spyware is not limited to the desktop browser: it can also operate in a critical app or on a mobile phone.

Detailed explanation-2: -Bots and Botnets In cybersecurity, a bot typically refers to an infected device containing malicious software. Without the user’s knowledge or permission, a bot can corrupt the device. Botnet attacks are targeted efforts by an army of bots, directed by their bot herder.

Detailed explanation-3: -Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. Spyware is also known for installing Trojan viruses.

There is 1 question to complete.