NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
To make a computer unusable
|
|
To get someone’s personal information
|
|
To find out card details
|
|
All of the above
|
Detailed explanation-1: -These online villains typically use phishing scams, spam email or instant messages and bogus websites to deliver dangerous malware to your computer and compromise your computer security. Computer hackers can also try to access your computer and private information directly if you are not protected by a firewall.
Detailed explanation-2: -Infecting devices with malware Hackers may infiltrate a user’s device to install malware. More likely, they will target potential victims via email, instant messages and websites with downloadable content or peer-to-peer networks.
Detailed explanation-3: -Malware and other viruses. Scammers may send you fake texts or emails with links that contain malware. If you click on the link, your device will be infected-allowing the hackers to crawl your computer for sensitive data or use spyware to spy on you in the background.