COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A program that is written to appear like a legitimate program.
A
Worms
B
Virus
C
Trojan Horse
D
Denial of Service (DoS) Attack
Explanation: 

Detailed explanation-1: -In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

Detailed explanation-2: -A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.

Detailed explanation-3: -Spyware is software that observes user activities, collecting sensitive data like account credentials or banking details. They send this data back to the attacker. Spyware is typically disguised as useful software, so it is generally considered as a type of trojan.

Detailed explanation-4: -E-mail with the aim of stealing passwords from a victim’s computer and then e-mailing the stolen data to a targeted recipient often distributes one of the most common types of Trojan horse.

There is 1 question to complete.