This is a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
Kavungya answered the question on May 17, 2019 at 09:29
-
Define Salamis.
(Solved)
Define Salamis.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Logic Bombs.
(Solved)
Describe Logic Bombs.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Data Diddling?
(Solved)
What is Data Diddling?
Date posted:
May 17, 2019
.
Answers (1)
-
Define IP Spoofing.
(Solved)
Define IP Spoofing.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe Password Sniffing.
(Solved)
Describe Password Sniffing.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Rootkits.
(Solved)
Define Rootkits.
Date posted:
May 17, 2019
.
Answers (1)
-
Define Keyloggers.
(Solved)
Define Keyloggers.
Date posted:
May 17, 2019
.
Answers (1)
-
Excess Privileges.
(Solved)
Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Define a Zero Day Attack.
(Solved)
Define a Zero Day Attack.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe social engineering.
(Solved)
Describe social engineering.
Date posted:
May 17, 2019
.
Answers (1)
-
What is Pharming?
(Solved)
What is Pharming?
Date posted:
May 17, 2019
.
Answers (1)
-
What is Phishing?
(Solved)
What is Phishing?
Date posted:
May 17, 2019
.
Answers (1)
-
Define electronic spamming.
(Solved)
Define electronic spamming.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting scanning attacks.
(Solved)
Describe the ways of detecting scanning attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Excess Privileges.
(Solved)
Describe the ways of detecting Excess Privileges.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Data Diddling.
(Solved)
Describe the ways of detecting Data Diddling.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
(Solved)
Describe the ways of detecting Trojan Horses, Viruses, Worms, Salamis, and Logic Bombs.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Timing Attacks.
(Solved)
Describe the ways of detecting Timing Attacks.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Trap Doors.
(Solved)
Describe the ways of detecting Trap Doors.
Date posted:
May 17, 2019
.
Answers (1)
-
Describe the ways of detecting Software Piracy.
(Solved)
Describe the ways of detecting Software Piracy.
Date posted:
May 17, 2019
.
Answers (1)