Information Technology IT – 5 eSecurity | e-Consult
5 eSecurity (1 questions)
Login to see all questions.
Click on a question to view the answer
Spyware: Spyware is designed to secretly monitor a user's computer activity and collect information without their knowledge or consent.
- Characteristics: Often bundled with legitimate software, difficult to detect. Can collect keystrokes, browsing history, email content, and other sensitive data.
- Compromise: Compromises user privacy and security by exposing personal information to attackers. This information can be used for identity theft, financial fraud, or targeted attacks.
- Preventative Measures:
- Use reputable antivirus/anti-malware software.
- Be cautious when downloading software from untrusted sources.
- Regularly scan your system for spyware.
- Keep your operating system and software up to date.
- Use a firewall.
Ransomware: Ransomware encrypts a victim's files and demands a ransom payment for the decryption key.
- Characteristics: Often spreads through phishing emails, malicious websites, or exploited vulnerabilities. Can encrypt various file types, including documents, photos, and videos.
- Compromise: Causes significant data loss and disruption. Even after paying the ransom, there's no guarantee that the files will be recovered.
- Preventative Measures:
- Regularly back up your data to an external drive or cloud storage.
- Be wary of suspicious emails and links.
- Keep your software up to date.
- Use a reputable antivirus/anti-malware solution.
- Implement strong access controls.