SOFTWARE ENGINEERING ETHICS AND PROFESSIONAL PRACTICES
SOFTWARE LICENSING AND INTELLECTUAL PROPERTY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
trojan horse
|
|
logic bomb
|
|
phish
|
|
brute force
|
Detailed explanation-1: -A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.
Detailed explanation-2: -A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Detailed explanation-3: -Zeus Gameover-a peer-to-peer version of the Zeus botnet without a centralized C&C. SpyEye-designed to steal money from online bank accounts. Ice IX-financial malware that can control content in a browser during a financial transaction, and extract credentials and private data from forms. More items