We will also look at the countermeasures that can be used to protect against such activities. In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. Trojans, viruses, and worms can be used to achieve the above-stated objectives. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. They often use these skills to gain access to systems. Some of the skills that hackers have are programming and computer networking skills.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |