COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following BEST describes a cyber terrorist?
A
Desires some kind of financial reward or revenge
B
Exploits internal vulnerabilities to steal information
C
Disrupts network-dependent institutions
D
Downloads and runs attacks available on the internet
Explanation: 

Detailed explanation-1: -Option C is the correct answer-Interrupting the network of institutions where students communicate with management for any use is one of the most common attacks that attackers perform as cyber terrorists.

Detailed explanation-2: -Cyber terrorism is the use of existing computers and information, particularly over the Internet, to cause physical or financial harm or a severe disruption of infrastructure service.

Detailed explanation-3: -Cyber terrorism involves the same techniques as traditional cyberattacks. Cyber terrorists can use DDoS attacks, various forms of malware, social engineering strategies, phishing campaigns and more to reach their targets.

Detailed explanation-4: -Threat actors try to disable or disrupt cities, cause a public health crisis, endanger public safety or cause massive panic and fatalities. For example, cyberterrorists might target a water treatment plant, cause a regional power outage or disrupt a pipeline, oil refinery or fracking operation. Cyberespionage.

There is 1 question to complete.