Professional Practice For Information Technology
Professional Practice For Information Technology
Worms
One of the most common types of malware worms, spread over
computer networks by exploiting operating system vulnerabilities. A
worm is a standalone program that replicates itself to infect other
computers without requiring action from anyone. Since they can
spread fast, worms are often used to execute a payload a piece of
code created to damage a system. Payloads can delete files on a
host system, encrypt data for a ransomware attack, steal information,
delete files, and create botnets.
Keyloggers
A keylogger is a type of spyware that monitors user activity.
Keyloggers can be used for legitimate purposes for example, families
who use them to keep track of their children's online activity or
organizations which use them to monitor employee activity. However,
when installed for malicious purposes, keyloggers can be used to
steal password data, banking information, and other sensitive
information. Keyloggers can be inserted into a system through
phishing, social engineering, or malicious downloads.
Spyware
Spyware is a form of malware that hides on your device, monitors
activity, and steals sensitive information like financial data, account
information, logins, and more. Spyware can spread by exploiting
software vulnerabilities or else be bundled with legitimate software or
in Trojans.
How to prevents from Exploits?
Protect vulnerabilities. One of the most ingenious delivery
methods for malware today is by exploit kit.
Watch out for social engineering. Another top method for
infection is to scam users through social engineering.
Practice safe browsing. There such a thing as good Internet
hygiene.
Layer your security. All the safe browsing and careful
vigilance in the world can’t protect you from all the threats
out there.
Question 2
Who are the primary perpetrators of computer crime, and
what are their objectives?