2. Malware, short for Malicious Software is any
software used to
Disrupt computer operation
Gather sensitive information
Gain access to private computer systems
4. A software program that monitors your
computer usage without your knowledge and
can
Eat up system resources
Affect performance
Steal confidential data
Keep track of what websites you visit
5. A program that delivers targeted advertising
content to users often by gathering information
from a user’s computer about what the user
does online and which websites are visited.
6. Adware can
Change your homepage
Flood your screen with multiple pop-up ads
Install tool bars in your browser
Read cookies installed on your computer
7. A program that keeps track of every
keystroke that you type at your computer.
Can gain access to your passwords, account
numbers, credit card numbers and other
personal data.
8. Applications that use unethical marketing
practices to trick users into paying for and
downloading worthless or malicious software
pretending as computer security software.
They display a bogus message announcing
that your computer has been infected with
spyware
Message is formatted to display as if it was
coming from your own security software
9.
10. A form of malware in which user’s files are
encrypted or the system is disabled if the
ransom is not paid.
“Ransom” consists of
Sending a premium SMS text message
A wired transfer
Online payment voucher services
The digital currency ‘bitcoin’
11. Ransomware can:
Encrypt text files, Word documents, PDF’s,
JPG picture files
Display false notices in the name of law
enforcement agencies that your system had
been used in illegal activities
Imitate Windows product activation notices
Could be an empty threat
12.
13. Is a malware program that installs without
user’s consent
Is attached to an executable file
Replicates by inserting copies of itself into
other programs, data files etc.
A virus can
Steal hard disk space or CPU time
Access private information
Corrupt data
14. A non-self-replicating type of malware
Looks legitimate (in the form of a music/
movie/game file)
Act as a backdoor, contacting a controller
which can have unauthorized access to the
affected computer
15. Standalone malware computer program
Does not need to attach itself to an existing
program
Replicates itself to spread to other computers
over a network
16. Using genuine operating system and keeping
it up to date
Regularly update everything installed on your
computer
Use a good anti-virus and anti-spyware
software
Use a built-in or third party firewall
Uninstall toolbars, plug-ins and other
software that you don’t use
17. Don’t open email attachments or downloaded
files without verifying their source
Be wary of clicking links in emails and while
browsing
Be alert to fake virus warnings, often within
web browser windows, that encourage you to
download, install or purchase unfamiliar
software
Heed warnings from web browsers, search
engines and security products