Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question No. 1 In your own words, define each of the following terms: a) Spyware

ID: 3580587 • Letter: Q

Question

Question No. 1

In your own words, define each of the following terms:

a) Spyware and Adware and.

b) Phishing and Spear phishing.

c) SQL injection.

Question No. 2 In your own words:

a) Define denial-of-service attack.

b) Do you agree with the statement says “it is morally acceptable to use a denial-of-service attack to shut down a Web server that distributes child pornography”?

Question No. 3 By considering the benefits and risks of online voting, Evaluate in your own words the online voting in term of Kantian Analysis.

Explanation / Answer

Hi, I have answered first question.

Please repost other question in separate post.


a) Spyware and Adware
   Spyware: The spy inside your PC
       It is program that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties.Spyware can get in a computer as a software virus or as a result of installing a new program.

   Adware: Advertisement-supported software
       They are generally spread through download of a software from an untrusted source from Internet
       It is any software package that automatically delivers advertisements
       Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware.

b)
   Phishing and Spear phishing

   Phishing: Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels.

   Spear phishing : Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by "random hackers" but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

c)
   SQl Injection:
   SQL injection is a technique where malicious users can inject SQL commands into an SQL statement, via web page input.Injected SQL commands can alter SQL statement and compromise the security of a web application.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote