COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is named for its method of getting past computer defenses by pretending to be something useful
|
|
It is a self-replicating program that uses the network to duplicate its code to the hosts on the network
|
|
Software program that displays advertising on your computer, often displayed in a pop-up window
|
|
It is unsolicited email that can be used to send harmful links or deceptive content
|
Detailed explanation-1: -Trojan horse. Malware named for its method of getting past computer defenses by pretending to be something useful. Zombie. A corrupted computer that is waiting for instructions and commands from its master, the attacker.
Detailed explanation-2: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users’ system access with their software.
Detailed explanation-3: -In computing, a Trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. Trojans generally spread by some form of social engineering.
Detailed explanation-4: -Never download or install software from a source you don’t trust completely. Never open an attachment or run a program sent to you in an email from someone you don’t know. Keep all software on your computer up to date with the latest patches. More items