COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
What type of software is used to circumvent normal security processes on a computer?
|
Backdoor
|
|
Trojan horse
|
|
spyware
|
|
phage virus
|
Explanation:
Detailed explanation-1: -In one example of backdoor malware, cybercriminals hid malware inside of a free file converter. No surprise-it didn’t convert anything. In fact, the download was designed solely to open up a backdoor on the target system.
Detailed explanation-2: -A backdoor is a malware type that negates normal authentication procedures to access a system. As a result, remote access is granted to resources within an application, such as databases and file servers, giving perpetrators the ability to remotely issue system commands and update malware.
There is 1 question to complete.