TECHNOLOGYS ETHICAL LEGAL PRIVACY ISSUES
INFORMATION PRIVACY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Back door
|
|
Virus & Worm
|
|
Spyware
|
|
Trojan and key logger
|
Detailed explanation-1: -Trojan. Keylogger may covertly monitor user behaviour and harvest personally identifiable information including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity.
Detailed explanation-2: -Types of cyber threats your institution should be aware of include: Malware. Ransomware. Distributed denial of service (DDoS) attacks.
Detailed explanation-3: -Keyloggers are a form of spyware where users are unaware their actions are being tracked. Keyloggers can be used for a variety of purposes; hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities.
Detailed explanation-4: -Spyware. Spyware is software that observes user activities, collecting sensitive data like account credentials or banking details. They send this data back to the attacker. Spyware is typically disguised as useful software, so it is generally considered as a type of trojan.