COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Worms
|
|
Virus
|
|
Trojan Horse
|
|
Denial of Service (DoS) Attack
|
Detailed explanation-1: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.
Detailed explanation-2: -A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
Detailed explanation-3: -Spyware is software that observes user activities, collecting sensitive data like account credentials or banking details. They send this data back to the attacker. Spyware is typically disguised as useful software, so it is generally considered as a type of trojan.
Detailed explanation-4: -E-mail with the aim of stealing passwords from a victim’s computer and then e-mailing the stolen data to a targeted recipient often distributes one of the most common types of Trojan horse.