Cns QB
Cns QB
Types:
1.Virus
2.Worm
3.Trojan Horse
4.Trapdoor/Backdoor
Trojan horse - The Trojan horse gets its name from the well-
known story of the Trojan War. It is a malicious piece of code
with the ability to take control of the system.
Trojan Horse is a destructive program.
It usually pretends as computer games or application
software.
If executed, the computer system will be damaged. Trojan
Horse usually comes with monitoring tools and key loggers.
These are active only when specific events are alive. These are
hidden with packers, crypters and wrappers.Hence, difficult to
detect through antivirus. These can use manual removal or
firewall precaution.
16)
Trojan horse - The Trojan horse gets its name from the well-
known story of the Trojan War. It is a malicious piece of code
with the ability to take control of the system.
Trojan Horse is a destructive program.
It usually pretends as computer games or application
software. If executed, the computer system will be damaged.
Trojan Horse usually comes with monitoring tools and key
loggers. These are active only when specific events are alive.
These are hidden with packers, crypters and wrappers.Hence,
difficult to detect through antivirus. These can use manual
removal or firewall precaution.
14)
What is Phishing?
"Phish" is pronounced like the word "fish" - the analogy is that
anyone who throws a backed hook out (phishing email) and
expects you to bite. Phishing is a crime where people share
their confidential information like passwords and credit
card numbers with hackers.
There is more than one way to reel in the hunt with real
fishing, but the phishing strategy is the most common.
When the victim opens the email, then they see a scary
message to overcome by their better judgment by filling them
in fear. The message demands immediate action; otherwise
suffers some consequences.
Phishing is a cyber-attack which uses the email as a weapon.
### 1. **Confidentiality**
- **Definition:** Confidentiality ensures that sensitive
information is accessed only by authorized individuals and is
protected from unauthorized access.
- **Significance:** This is critical for protecting personal
data, proprietary business information, and other confidential
material. Without confidentiality, sensitive information could
be exposed to unauthorized users, leading to privacy
breaches, identity theft, or corporate espionage.
### 2. **Integrity**
- **Definition:** Integrity ensures that data is accurate and
unaltered, both during storage and transmission. It protects
data from unauthorized modification.
- **Significance:** Maintaining data integrity is crucial for
ensuring that information is reliable and trustworthy. If data
integrity is compromised, it can lead to incorrect decisions,
financial loss, and damage to the reputation of individuals or
organizations.
### 3. **Availability**
- **Definition:** Availability ensures that systems, data, and
services are accessible and usable by authorized users
whenever needed.
- **Significance:** Availability is vital for the smooth
operation of businesses and services. If systems are
unavailable due to attacks (e.g., Denial of Service attacks) or
other failures, it can result in significant disruptions, financial
losses, and a loss of customer trust.