i. Botnets- A collection of software robots, or 'bots', that creates an army of infected computers (known as ‘zombies') that are remotely controlled by the originator.
ii. Distributed denial-of-Service - A distributed denial-of-service (DDoS) attack is when a malicious user gets a network of zombie computers to sabotage a specific website or server.
iii. Hacking- Gaining unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.
iv. Malware- Malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware. May reformat the hard drive of your computer causing you to lose all your information, send emails on your behalf e.t.
v. Spyware- Software that collects personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses.
Judiesiz answered the question on August 20, 2018 at 07:19
- a. You have been appointed by a leading Enterprise to assess and evaluate its system of IT internal controls. What are the key management practices to...(Solved)
a. You have been appointed by a leading Enterprise to assess and evaluate its system of IT internal controls. What are the key management practices to be followed to carry on the assignment complying with COBIT?
Date posted: August 20, 2018. Answers (1)
- What do you understand by IT Governance? Write any three benefits of IT Governance. (Solved)
What do you understand by IT Governance? Write any three benefits of IT Governance.
Date posted: August 20, 2018. Answers (1)
- As an IS Auditor, what are the risks reviewed by you relating to information Technology systems and processes as part of your functions(Solved)
As an IS Auditor, what are the risks reviewed by you relating to information Technology systems and processes as part of your functions.
Date posted: August 20, 2018. Answers (1)
- Modern business uses Information Technology to carry out basic functions including systems for sales, advertisement, purchase, management reports etc. Briefly discuss some of the information...(Solved)
Modern business uses Information Technology to carry out basic functions including systems for sales, advertisement, purchase, management reports etc. Briefly discuss some of the information Technology tools crucial for Business Growth
Date posted: August 20, 2018. Answers (1)
- Explain four security measures against threats to computer applications security(Solved)
Explain four security measures against threats to computer applications security
Date posted: July 11, 2018. Answers (1)
- Explain the following terminologies as used in computer?1:Information 2:Data3:Data processing 4:Computer system(Solved)
Explain the following terminologies as used in computer?
1:Information
2:Data
3:Data processing
4:Computer system
Date posted: July 11, 2018. Answers (1)
- Describe the main purpose and tasks of Step 2 of the logical database design methodology.(Solved)
Describe the main purpose and tasks of Step 2 of the logical database design methodology.
Date posted: July 9, 2018. Answers (1)
- Describe two approaches to checking that a logical data model supports the transactions required by the user. (Solved)
Describe two approaches to checking that a logical data model supports the transactions required by the user.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to checking a data model for redundancy. Give an example to illustrate your answer.(Solved)
Discuss an approach to checking a data model for redundancy. Give an example to illustrate your answer.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to identifying attributes from a users’ requirements specification and the association of attributes with entities or relationships.(Solved)
Discuss an approach to identifying attributes from a users’ requirements specification and the association of attributes with entities or relationships.
Date posted: July 9, 2018. Answers (1)
- Discuss an approach to identifying entities and relationships from a users’ requirements specification.(Solved)
Discuss an approach to identifying entities and relationships from a users’ requirements specification.
Date posted: July 9, 2018. Answers (1)
- Identify the main tasks associated with Step 1 of logical database design.(Solved)
Identify the main tasks associated with Step 1 of logical database design.
Date posted: July 9, 2018. Answers (1)
- Discuss the purpose of Step 1 of logical database design.(Solved)
Discuss the purpose of Step 1 of logical database design.
Date posted: July 9, 2018. Answers (1)
- Discuss the main activities associated with each step of the logical database design methodology(Solved)
Discuss the main activities associated with each step of the logical database design methodology
Date posted: July 9, 2018. Answers (1)
- Discuss the important role played by users in the process of database design.(Solved)
Discuss the important role played by users in the process of database design.
Date posted: July 9, 2018. Answers (1)
- Identify important factors in the success of database design.(Solved)
Identify important factors in the success of database design.
Date posted: July 9, 2018. Answers (1)
- Describe the main phases involved in database design.(Solved)
Describe the main phases involved in database design.
Date posted: July 9, 2018. Answers (1)
- Describe the purpose of a design methodology.(Solved)
Describe the purpose of a design methodology.
Date posted: July 9, 2018. Answers (1)
- Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.(Solved)
Describe what is meant by transitive dependency and describe how this type of dependency relates to 3NF. Provide an example to illustrate your answer.
Date posted: July 9, 2018. Answers (1)
- Describe the characteristics of a table in third normal form (3NF).(Solved)
Describe the characteristics of a table in third normal form (3NF).
Date posted: July 9, 2018. Answers (1)