Question
Download Solution PDFMatch List - I with List - II.
List - I (Computer attack/cyber crime) |
List - II (Definition) |
||
(A) |
Worm |
(I) |
Misdirecting users to a fraudulent website without their knowledge or consent |
(B) |
Bot |
(II) |
A malware that replicates itself in order to spread to other computers across the network |
(C) |
Denial-of-Service |
(III) |
Flooding sites with useless traffic to overwhelm a network |
(D) |
Pharming |
(IV) |
A malware that responds to external commands sent by an attacker |
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
Option 1 : (A)-(II), (B)-(IV), (C)-(III), (D)-(I)
Detailed Solution
Download Solution PDFThe correct answer is - (A)-(II), (B)-(IV), (C)-(III), (D)-(I)
Key Points
- Worm (A)-(II)
- A worm is a type of malware that replicates itself in order to spread to other computers across the network.
- Unlike viruses, worms do not need to attach themselves to an existing program.
- They exploit vulnerabilities in operating systems or applications to spread.
- Bot (B)-(IV)
- A bot is a malware that responds to external commands sent by an attacker.
- Bots are often used in botnets to carry out tasks like sending spam emails or participating in DDoS attacks.
- They allow remote control of the infected system by the attacker.
- Denial-of-Service (C)-(III)
- Denial-of-Service (DoS) attacks flood sites with useless traffic to overwhelm a network.
- The primary goal is to make a website or online service unavailable to its intended users.
- DDoS (Distributed Denial-of-Service) is a more complex form involving multiple compromised systems to launch the attack.
- Pharming (D)-(I)
- Pharming involves misdirecting users to a fraudulent website without their knowledge or consent.
- It is often used to steal sensitive information such as login credentials and financial data.
- Pharming can be accomplished by exploiting vulnerabilities in DNS servers or by using malicious software.
Additional Information
- Malware Types
- Viruses: Malware that attaches itself to a legitimate program and spreads when the program is executed.
- Trojans: Malware disguised as legitimate software, which provides unauthorized access to the user's system.
- Ransomware: Malware that encrypts user data and demands a ransom to restore access.
- Cyber Security Measures
- Firewalls: Network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules.
- Antivirus Software: Programs designed to detect and remove malware from the computer.
- Encryption: The process of encoding data to prevent unauthorized access.
- Phishing
- Similar to pharming but involves tricking users into providing sensitive information through fraudulent emails or messages.
- Often involves impersonating a trustworthy entity to gain the user's confidence.