FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS PHISHING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which are common types of malware?
A
Adware
B
Ransomware
C
Key Logger
D
Mouse Hacker
E
Windows Breaker
Explanation: 

Detailed explanation-1: -Keyloggers are used to gain fraudulent access to confidential information such as personal details, credit card data, access credentials, etc. There are two types of keyloggers, based on the method used to log keystrokes: software keyloggers and hardware keyloggers.

Detailed explanation-2: -Keyloggers are often used as a spyware tool by cybercriminals to steal personally identifiable information (PII), login credentials and sensitive enterprise data.

Detailed explanation-3: -As part of an organization’s security and data protection program, it should have a plan in place that, at minimum, mitigates risk to systems and networks arising from four common types of malicious software: trojans, spyware, viruses, and ransomware.

Detailed explanation-4: -A few examples of illegitimate keylogger uses are: Intercepting and stealing personal information such as credit card numbers and other sensitive information; Stealing a spouse’s online login credentials to monitor their social media; Stalk an ex-spouse, friend, or other non-consenting people.

There is 1 question to complete.