(a) Pharming: This involves redirecting users to a bogus Web page, even when individual types correct Web page address into his or her browser.
(b) Phishing: This involves setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data for example, Typo pirates play on the names of famous sites to collect authentication and registration information. For example, http://www.ibm.com/shop is registered by the attacker as www.ibn.com/shop. A shopper mistypes and enters the illegitimate site and provides confidential information.
(c) Cracking: This is the illegal use of guesswork to break into a computer system to view or modify information.
(d) Hacking: This is the illegal use of a special program to break into a computer system to view, destroy or modify or collect the information.
(e) Tapping: This is the illegal use of an intelligent program like spyware to intercept information or messages of transit from one system to another in a computer network.
(f) Trespassing: This is the act of gaining access or entering into the computer room without permission to use the computer system.
(g) Piracy: This is the act of making illegal production of copies of software without owner's permission.
(h) Fraud: This is the use of a computer system to deprive or perform illegal operations such as money laundering or forgery.
(i) Industrial espionage: Spying on your competitor to get information that you can use to counter or defeat the competitor.
(j) Spoofing: Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else or Redirecting Web link to address different from intended one, with site masquerading as intended destination.
(k) Denial-of-services attacks (Dos): Flooding server with thousands of false requests to crash the network.
maurice.mutuku answered the question on April 16, 2018 at 08:12
- Define the term computer software(Solved)
Define the term computer software.
Date posted: April 16, 2018. Answers (1)
- How can theft lead to loss of data in a computer systems and what control measures can be put in place to curb this problem?(Solved)
Explain how theft can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can natural calamities lead to loss of data in a computer systems and what control measures can be put in place to curb this...(Solved)
Explain how natural calamities can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can computer hardware and software faults be seen as a threat to computer systems and what control measures can be enforced to curb this...(Solved)
Explain how computer hardware and software faults can be seen as a threat to computer systems. Also give the control measure(s) that can be enforced to curb this problem.
Date posted: April 14, 2018. Answers (1)
- How can unauthorized access lead to a threat to computer systems and what control measure can be put in place to curb this vice?(Solved)
Discuss how unauthorized access can lead to a threat to computer systems and what control measure can be put in place to curb this vice.
Date posted: April 14, 2018. Answers (1)
- How can you prevent viruses from attacking your computer?(Solved)
Give ways of preventing viruses from attacking your computer.
Date posted: April 14, 2018. Answers (1)
- In what ways do viruses spread from one computer to another?(Solved)
Give ways in which viruses spread from one computer to another.
Date posted: April 14, 2018. Answers (1)
- What are the symptoms of a computer infected by viruses?(Solved)
List the symptoms of a computer infected by viruses.
Date posted: April 14, 2018. Answers (1)
- What are the types of computer viruses?(Solved)
Highlight the types of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What are the common properties of computer viruses?(Solved)
Discuss the common properties of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018. Answers (1)
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018. Answers (1)
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018. Answers (1)
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018. Answers (1)
- What is data security?(Solved)
Define data security.
Date posted: April 14, 2018. Answers (1)
- What is data privacy?(Solved)
Define data privacy.
Date posted: April 14, 2018. Answers (1)
- Which procedure would you use in accessing a research topic notes from the Internet?(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted: April 14, 2018. Answers (1)
- What are the qualities of good e-mail contact management software?(Solved)
Give the qualities of good e-mail contact management software.
Date posted: April 14, 2018. Answers (1)
- Explain some commonly used workbook management practices when working on MS Excel.(Solved)
Explain some commonly used workbook management practices when working on MS Excel.
Date posted: April 14, 2018. Answers (1)
- State the basic keyboard shortcut keys used to format and edit a spreadsheet.(Solved)
State the basic keyboard shortcut keys used to format and edit a spreadsheet.
Date posted: April 14, 2018. Answers (1)