SlideShare a Scribd company logo
1 of 1
Download to read offline
Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing?
Solution
Computer virus: A virus attaches itself to a file and will affect the computer. It can spread from
one computer to another and leave infection. They are generally attached to executable files and
can only affect your computer if you execute the program. Generally the host computer will still
function, unless the virus damages the host program altogether.
Worms: Worms are quite similar to viruses, they spread from one computer to another and infect
the host computer. But they don't have to attached to any other file or program. they can't act as
stand alone programs.
Phishing: It is a scam in which the hacker will try to learn your sensitive login information by
posing as a legitimate entity. Generally the victim receives an email sent by a legitimate
organization. The email will redirect the user to install some malware or login with credentials
on a fake but legitimate looking software.
Spear phising: Phishing attack directed at specific individuals or organization to gain access to
their confidential data is known as spear phishing. Thie is genrally done for financial gain by the
competitors.

More Related Content

Similar to Contrast the following types of remote attacks virus, worm, phishin.pdf

Similar to Contrast the following types of remote attacks virus, worm, phishin.pdf (20)

Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Virus
VirusVirus
Virus
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber security
Cyber security Cyber security
Cyber security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
KNOW THE ENEMY
KNOW THE ENEMYKNOW THE ENEMY
KNOW THE ENEMY
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Viruses worms trojan horses lisa
Viruses worms  trojan horses lisaViruses worms  trojan horses lisa
Viruses worms trojan horses lisa
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 

More from jaronkyleigh59760

Determine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfDetermine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfjaronkyleigh59760
 
Define the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfDefine the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfjaronkyleigh59760
 
Create the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfCreate the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfjaronkyleigh59760
 
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfjaronkyleigh59760
 
A red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfA red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfjaronkyleigh59760
 
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdfjaronkyleigh59760
 
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfReview Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfjaronkyleigh59760
 
write a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfwrite a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfjaronkyleigh59760
 
Why do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfWhy do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfjaronkyleigh59760
 
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule  C_12 H_9 SO_3.pdfWhich of the following is not an organic molecule  C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule C_12 H_9 SO_3.pdfjaronkyleigh59760
 
1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdfjaronkyleigh59760
 
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfwhat does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfjaronkyleigh59760
 
what are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfwhat are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfjaronkyleigh59760
 
What factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfWhat factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfjaronkyleigh59760
 
What are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfWhat are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfjaronkyleigh59760
 
There are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfThere are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfjaronkyleigh59760
 
List the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfList the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfjaronkyleigh59760
 
ldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfjaronkyleigh59760
 
Item 1In the case below, the original source material is given alo.pdf
Item 1In the case below, the original source material is given alo.pdfItem 1In the case below, the original source material is given alo.pdf
Item 1In the case below, the original source material is given alo.pdfjaronkyleigh59760
 
In your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfIn your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfjaronkyleigh59760
 

More from jaronkyleigh59760 (20)

Determine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfDetermine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdf
 
Define the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfDefine the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdf
 
Create the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfCreate the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdf
 
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
 
A red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfA red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdf
 
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
 
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfReview Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
 
write a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfwrite a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdf
 
Why do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfWhy do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdf
 
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule  C_12 H_9 SO_3.pdfWhich of the following is not an organic molecule  C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
 
1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf
 
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfwhat does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
 
what are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfwhat are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdf
 
What factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfWhat factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdf
 
What are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfWhat are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdf
 
There are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfThere are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdf
 
List the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfList the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdf
 
ldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdf
 
Item 1In the case below, the original source material is given alo.pdf
Item 1In the case below, the original source material is given alo.pdfItem 1In the case below, the original source material is given alo.pdf
Item 1In the case below, the original source material is given alo.pdf
 
In your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfIn your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfNirmal Dwivedi
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxRugvedSathawane
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 

Recently uploaded (20)

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 

Contrast the following types of remote attacks virus, worm, phishin.pdf

  • 1. Contrast the following types of remote attacks: virus, worm, phishing, and spear phishing? Solution Computer virus: A virus attaches itself to a file and will affect the computer. It can spread from one computer to another and leave infection. They are generally attached to executable files and can only affect your computer if you execute the program. Generally the host computer will still function, unless the virus damages the host program altogether. Worms: Worms are quite similar to viruses, they spread from one computer to another and infect the host computer. But they don't have to attached to any other file or program. they can't act as stand alone programs. Phishing: It is a scam in which the hacker will try to learn your sensitive login information by posing as a legitimate entity. Generally the victim receives an email sent by a legitimate organization. The email will redirect the user to install some malware or login with credentials on a fake but legitimate looking software. Spear phising: Phishing attack directed at specific individuals or organization to gain access to their confidential data is known as spear phishing. Thie is genrally done for financial gain by the competitors.