COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following security threats includes suspicious activity, such as reviewing someone’s screen display without permission?
A
Malware
B
Shoulder surfing
C
Phishing
D
Password cracking
Explanation: 

Detailed explanation-1: -Malware. Malicious software, also known as malware, can steal, encrypt or delete private information, monitor computer activity without user permission or alter core computing function of the device. Spyware and viruses are examples of malware.

Detailed explanation-2: -The main types of information security threats are: Malware attack. Social engineering attacks. Software supply chain attacks.

Detailed explanation-3: -Common threats against confidentiality are: Eavesdropping attacks. Encryption cracking. Malicious insiders.

Detailed explanation-4: -Computer Viruses. Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. Spyware Threats. Hackers and Predators. Phishing.

There is 1 question to complete.