1.Collect the information on digital attacks in the field of I.T. with the help of search engine.1. Spamming 2. Computer Virus 3. Worm 4. Malware5. Spyware 6. Trojan horse 7. Denial of Service 8. Phishing
Answers
Answered by
10
Ans.:
1. Spamming – spamming is the process of sending an unsolicited message, mainly an advertisement several times of the same site.
2. Computer Virus – it is a harmful software program which when executed changes itself by transforming other computer programs and producing its own code.
3. Worm – similar to a virus, a worm can travel from one computer to another without any human support. It takes shelter in different files and it is through files that the worms spread.
4. Malware – also known as the malicious software, malware is introduced to cause harm to the computer or server or computer network.
5. Spyware – the purpose of this software is to collect information of a person without his or her consent. It is formulated only on those devices that are ready to supply information in secret.
6. Trojan Horse – initially it will look like a beneficial software but will actually bring damage once installed. People on the other end are tricked to open it.
7. Denial of service – this is a cyber attack in which the perpetrator intentionally refuses access to the user’s computer or network by disrupting services.
8. Phishing – this is a delicate program and used to get access to sensitive information like username, password, credit card details, bank details, etc.
1. Spamming – spamming is the process of sending an unsolicited message, mainly an advertisement several times of the same site.
2. Computer Virus – it is a harmful software program which when executed changes itself by transforming other computer programs and producing its own code.
3. Worm – similar to a virus, a worm can travel from one computer to another without any human support. It takes shelter in different files and it is through files that the worms spread.
4. Malware – also known as the malicious software, malware is introduced to cause harm to the computer or server or computer network.
5. Spyware – the purpose of this software is to collect information of a person without his or her consent. It is formulated only on those devices that are ready to supply information in secret.
6. Trojan Horse – initially it will look like a beneficial software but will actually bring damage once installed. People on the other end are tricked to open it.
7. Denial of service – this is a cyber attack in which the perpetrator intentionally refuses access to the user’s computer or network by disrupting services.
8. Phishing – this is a delicate program and used to get access to sensitive information like username, password, credit card details, bank details, etc.
Similar questions
Math,
7 months ago
Biology,
7 months ago
Psychology,
7 months ago
Environmental Sciences,
1 year ago
Math,
1 year ago
History,
1 year ago
Physics,
1 year ago
Music,
1 year ago