COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Phishing emails are an example of a social engineering threat to IT systems. What are two possible goals of a phishing email?
|
To infect your computer with malware, so confidential data can be stolen later.
|
|
To delete all your confidential data on your hard disk drive.
|
|
To get users to respond with confidential data.
|
|
To launch a denial of service attack to take down a server storing confidential data.
|
Explanation:
Detailed explanation-1: -Types of phishing attacks range from classic email phishing schemes to more inventive approaches such as spear phishing and smishing. All have the same purpose – to steal your personal details.
Detailed explanation-2: -Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer.
Detailed explanation-3: -Phishing. Phishing is the most common type of social engineering attack. Pretexting. Baiting. Quid Pro Quo. Tailgating. CEO Fraud. 01-Mar-2023
There is 1 question to complete.