Computer Science, asked by harshagrawal44, 11 months ago

define the following term
A) virus b) Trojan Horse c) key logger ​

Answers

Answered by Karthikrikky12
3

a) virus

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

b) Trojan horse

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

c)Key logger

A keylogger (keystroke logging) is a type of surveillance software that once installed on a system, has the capability to record every keystroke made on that system. The Recording is saved in a log file, usually encrypted.

HOPE THIS HELPS YOU

PLEASE FOLLOW ME

MARK ME AS BRAINLIST


Karthikrikky12: please follow me
Answered by raghav817
1

Answer:

Hey, mate here's your answer

Explanation:

a) virus

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

b) Trojan horse

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer.

A Trojan horse may also be referred to as a Trojan horse virus, but that is technically incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can it propagate without an end user's assistance. This is why attackers must use social engineering tactics to trick the end user into executing the Trojan. Typically, the malware programming is hidden in an innocent-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user's computing device. Once inside, the malicious code can execute whatever task the attacker designed it to carry out.

c)Key logger

A keylogger (keystroke logging) is a type of surveillance software that once installed on a system, has the capability to record every keystroke made on that system. The Recording is saved in a log file, usually encrypted.

HOPE THIS HELPS YOU

PLEASE FOLLOW ME

MARK ME AS BRAINLIST

Similar questions