answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Malicious code can do the following except corrupt files erase your hard drive make your computer more secure allow hacker access?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is backdoor Trojan horses?

A backdoor Trojan horse is a malicious program that allows the hacker to view everything on your computer.


What is malicious access?

Crimes involving illegal system access and use of computer services are concern to both government and business.


Why computers are prone to viruses?

Computers run applications and for applications to be useful they need access to important systems that maintain your computer, viruses abuse these permissions and inflict malicious actions on your computer


What does the website 'Software IT' mainly do?

Malware, short for malicious software, is a software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.


What does an intrusion prevention system do?

An intrusion prevention system, as the name suggests, is a computer network appliance that prevents network access to individuals or viruses that are deemed to have malicious intentions.


What happens when persons other than authorized users gain access to information for other than the authorized purpose?

It depends on their motive. They can accidentally gain unauthorized access to such information by accidetally exploiting a bug (surprisingly, this is very common) and not even know it. Or they could accidentally have access and know it, but leave it alone. Or they could be malicious and destroy or corrupt the data.


What does a Trojan horse virus do?

A "trojan horse" is not a virus; it's a type of malware that may be spread like a virus. It hides within other programs, or pretends to be a trusted program, but it is really malicious software. Like the Trojan Horse in the Iliad, it secretly does damage once you mistakenly let it into your computer system. It can be used to steal information from the computer.


What is in ethical hacking?

Ethical hac involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical involves duplicating strategies and actions of malicious attackers.


Harmful effects of viruses in a computer system?

Viruses commonly have the following affects on computers: destruction/theft of data, and malicious access to the computer resources. Data is stolen sometimes for identity theft and sometimes for business reasons such as stealing customer information for competition. Other times the data is destroyed either for malicious reasons, or for interruption of business processes. Optionally the virus is installed for use as a 'door' to the computer's resources such as using the computer for spamming.


What is unauthorised access to computer systems and services?

Unauthorized access, you can be tagged as a hacker or simply as a malicious person trying to access others computer system.Some country can punished you in this petty crime.There is now a such law for Cyber crimes.Hope my answer helped you.


What type of malicious code is placed within a program to allow future access?

q


What is malicious insider?

A malicious insider is an employee or authorized person who uses his data access for harmful, unethical, or illegal activities. Because of the wider access available internally, insiders are often harder to detect and apprehend than external attackers or hackers.