Professional Documents
Culture Documents
Cyberlaw Questions
Cyberlaw Questions
Can be intentional or
1 unintentional Is intentional
The first type of attack is passive attack. A passive attack can monitor, observe or build
use of the system’s data for sure functions. However, it doesn’t have any impact on the
system resources, and also, the data can stay unchanged. The victim is difficult to note
passive attacks as this sort of attack is conducted in secret. Passive attack aims to
achieve data or scan open ports and vulnerabilities of the network.
A virus hoax is a false warning about a computer virus. Typically, the warning
arrives in an email note or is distributed through a note in a company's
internal network.
These notes are usually forwarded using distribution lists, and they will
typically suggest that the recipient forward the note to other distribution
lists.
If someone gets a message warning about a new virus, they can check it
out by going to one of the leading websites that keep up with viruses and
computer virus hoaxes. If someone sends them a note about a virus that
they learn is a virus hoax, they should reply to the sender that the virus
warning is a hoax.
Q. What are computer worms?
A computer worm is a type of malware that spreads copies of itself from computer to
computer. A worm can replicate itself without any human interaction, and it does not need to
attach itself to a software program in order to cause damage. Worms can be transmitted via
software vulnerabilities. Or computer worms could arrive as attachments in spam emails or
instant messages (IMs). Once opened, these files could provide a link to a malicious website
or automatically download the computer worm. Once it’s installed, the worm silently goes to
work and infects the machine without the user’s knowledge.