Question
Download Solution PDFWhich of the following are correct in context of network security?
A. Virus, worms, and Trojan horse are examples of Malware
B. Trojan horse is a non-self-replicating malicious software
C. After receiving payment, if the product is not delivered it is an example of phishing
D. In https, 's' stands for Secure
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Option 4 : A, B and D only
Detailed Solution
Download Solution PDFThe correct answer is - A, B, and D only
Key Points
- Virus, worms, and Trojan horse are examples of Malware
- These are various types of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- Trojan horse is a non-self-replicating malicious software
- A Trojan horse appears to be legitimate software but performs malicious activities once installed.
- Unlike viruses and worms, Trojans do not replicate themselves.
- In https, 's' stands for Secure
- HTTPS stands for HyperText Transfer Protocol Secure.
- It ensures that data exchanged between the web browser and the server is encrypted and secure.
Additional Information
- Malware Types
- Virus: A malicious program that attaches itself to other software and can replicate itself.
- Worm: A self-replicating program that spreads across computers and networks without needing to attach to other software.
- Trojan Horse: A type of malware that disguises itself as legitimate software but performs malicious actions once executed.
- Phishing
- Phishing is a type of social engineering attack where attackers deceive individuals into providing sensitive information, such as usernames, passwords, and credit card details, by pretending to be a trustworthy entity.
- Phishing typically involves fraudulent emails or websites that look legitimate.
- HTTPS Encryption
- HTTPS uses TLS (Transport Layer Security) or SSL (Secure Sockets Layer) protocols to encrypt data.
- This ensures data integrity and privacy, protecting against eavesdropping and tampering.