Introduction to Information Security


Danger level: High Prevalence: High



Download 1,39 Mb.
bet35/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   31   32   33   34   35   36   37   38   ...   44
Bog'liq
CSS

Danger level: High

Prevalence: High

Worst case damage:

  • Spyware programs can collect various types of personal information:
    • Websites visited;
    • Credit card details;
    • Usernames or passwords;
    • Install other malware;
    • Redirect web browsers to malicious websites; or
    • Divert advertising revenue to a third party or change computer settings (often leading to degraded or unstable system performance, slow connection speeds or different home pages).

    Most Common Computer Security Threats (Keylogging)

    KEYSTROKE LOGGING (KEYLOGGING)

    • A keylogger is a software program that is installed on a computer, often by a Trojan horse or virus.
    • Keyloggers capture and record user keystrokes.
    • The data captured is then transmitted to a remote computer.
    • Danger level: High

      Prevalence: High

       

    • Worst case damage:
      • While keyloggers will not damage your computer system per se, because they can capture passwords, credit card numbers and other sensitive data, they should be regarded as a serious threat.

    Most Common Computer Security Threats (Adware)

    Threat #6: Adware

    • Adware is software which automatically plays, displays, or downloads advertisements to a computer.
    • The adware runs either after a software program has been installed on a computer or while the application is being used.
    • In some cases, adware is accepted by users in exchange for using software free-of-charge.
    • Not all adware is innocuous, however, some types of adware are also spyware and therefore a threat to privacy.
    • Danger level: Low

      Prevalence: High

    • Worst case damage:
      • Adware is relatively harmless unless it is spyware (see spyware). It can, however, cause degradation in system performance.

    Download 1,39 Mb.

    Do'stlaringiz bilan baham:
    1   ...   31   32   33   34   35   36   37   38   ...   44




    Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
    ma'muriyatiga murojaat qiling

    kiriting | ro'yxatdan o'tish
        Bosh sahifa
    юртда тантана
    Боғда битган
    Бугун юртда
    Эшитганлар жилманглар
    Эшитмадим деманглар
    битган бодомлар
    Yangiariq tumani
    qitish marakazi
    Raqamli texnologiyalar
    ilishida muhokamadan
    tasdiqqa tavsiya
    tavsiya etilgan
    iqtisodiyot kafedrasi
    steiermarkischen landesregierung
    asarlaringizni yuboring
    o'zingizning asarlaringizni
    Iltimos faqat
    faqat o'zingizning
    steierm rkischen
    landesregierung fachabteilung
    rkischen landesregierung
    hamshira loyihasi
    loyihasi mavsum
    faolyatining oqibatlari
    asosiy adabiyotlar
    fakulteti ahborot
    ahborot havfsizligi
    havfsizligi kafedrasi
    fanidan bo’yicha
    fakulteti iqtisodiyot
    boshqaruv fakulteti
    chiqarishda boshqaruv
    ishlab chiqarishda
    iqtisodiyot fakultet
    multiservis tarmoqlari
    fanidan asosiy
    Uzbek fanidan
    mavzulari potok
    asosidagi multiservis
    'aliyyil a'ziym
    billahil 'aliyyil
    illaa billahil
    quvvata illaa
    falah' deganida
    Kompyuter savodxonligi
    bo’yicha mustaqil
    'alal falah'
    Hayya 'alal
    'alas soloh
    Hayya 'alas
    mavsum boyicha


    yuklab olish