Distinguish between the following: Trojan horse, sniffer, spyware, trap door, logic bomb, stealth virus, and phishing.
What will be an ideal response?
Trojan horse: hacker back-door virus
Sniffer: intercepts and records electronic traffic
Spyware: tracking online
Trap door: allows the security safeguards to be bypassed
Logic Bomb: virus programs that contain a delay
Stealth Virus: viruses that hide inside computer memory
Phishing: fish for passwords and financial information, usually via e-mail
You might also like to view...
What is a Drug Abuse?
What will be an ideal response?
The year and a day rule is considered an outdated common law relic
Indicate whether the statement is true or false
_______________ includes crisis intervention, treatment for youths and their families, outreach, and referral to social services
Fill in the blank(s) with correct word
There can be a sense of ________ associated with working undercover because of the need to essentially betray the trust of those who have come to trust you
Fill in the blank(s) with the appropriate word(s).