NETWORK SECURITY
FIREWALLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Websites and Keystrokes
|
|
How many dogs/cats you have
|
|
Network Devices
|
|
Your window
|
Detailed explanation-1: -At its most damaging, spyware will track web browsing history, passwords and other private information, such as email addresses, credit card numbers, personal identification numbers or banking records. All of this information can be gathered and used for identity theft or sold to third parties.
Detailed explanation-2: -A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
Detailed explanation-3: -Spyware collects personal and sensitive information that it sends to advertisers, data collection firms, or malicious actors for a profit. Attackers use it to track, steal, and sell user data, such as internet usage, credit card, and bank account details, or steal user credentials to spoof their identities.
Detailed explanation-4: -Spyware is mostly classified into four types: adware, system monitors, tracking including web tracking, and trojans; examples of other notorious types include digital rights management capabilities that “phone home", keyloggers, rootkits, and web beacons.
Detailed explanation-5: -Spyware is malware that tracks your internet activity to gather sensitive information like credit card numbers. To protect yourself, use anti-spy software, avoid pop-ups, update your system, and watch your email.