COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Trojan
|
|
Malware
|
|
Phishing
|
|
Worm
|
Detailed explanation-1: -Finance-based phishing attacks Usually, in these cases, the scammer poses as a bank or other financial institution. In an email or phone call, the scammer informs their potential victim that their security has been compromised. Often, scammers will use the threat of identity theft to successfully do just that.
Detailed explanation-2: -Email phishing. Most phishing attacks are sent by email. Spear phishing. There are two other, more sophisticated, types of phishing involving email. Whaling. Whaling attacks are even more targeted, taking aim at senior executives. Smishing and vishing. Angler phishing. 31-Jan-2023
Detailed explanation-3: -Urgent action demands. Poor grammar and spelling errors. An unfamiliar greeting or salutation. Requests for login credentials, payment information or sensitive data. Offers that are too good to be true. Suspicious or unsolicited attachments. Inconsistencies in email addresses, links and domain names.
Detailed explanation-4: -say they’ve noticed some suspicious activity or log-in attempts-they haven’t. claim there’s a problem with your account or your payment information-there isn’t. say you need to confirm some personal or financial information-you don’t. include an invoice you don’t recognize-it’s fake. More items