COMPUTER ETHICS AND SECURITY
FIREWALLS AND ANTIVIRUS SOFTWARE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
worm
|
|
backdoor
|
|
trojan horse
|
|
spyware
|
Detailed explanation-1: -Trojan horse programs are malware that is disguised as legitimate software. A Trojan horse program will hide on your computer until it’s called upon. When activated, Trojans can allow threat actors to spy on you, steal your sensitive data, and gain backdoor access to your system.
Detailed explanation-2: -A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action.
Detailed explanation-3: -Usually, Trojan files remain hidden at this stage and once the permission is granted, Trojans are installed on the system and a backdoor is created. Using the back-door hackers/attackers became capable to gain admin-like access to the system and do whatever they want to do.