0% found this document useful (0 votes)
5 views4 pages

Professional Practice For Information Technology

The document discusses common types of computer exploits, including viruses, Trojans, worms, adware, spyware, and keyloggers, detailing their functions and methods of infection. It also outlines preventive measures such as protecting vulnerabilities, being cautious of social engineering, practicing safe browsing, and layering security. Additionally, the document hints at a second question regarding the primary perpetrators of computer crime and their objectives, though this is not elaborated upon in the provided text.

Uploaded by

Ali Asad Watto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Professional Practice For Information Technology

The document discusses common types of computer exploits, including viruses, Trojans, worms, adware, spyware, and keyloggers, detailing their functions and methods of infection. It also outlines preventive measures such as protecting vulnerabilities, being cautious of social engineering, practicing safe browsing, and layering security. Additionally, the document hints at a second question regarding the primary perpetrators of computer crime and their objectives, though this is not elaborated upon in the provided text.

Uploaded by

Ali Asad Watto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Professional Practice For Information Technology

Assignment No: 3rd

Submitted By: Asad Yar

Submitted To: Nouman Khan


Registration No: FA21-BCS-212
Date of Submission: 08 JUNE,
2022
Campus: Abbottabad
Question 01
Discuss most common type of exploits and also ways to prevent
them?
There are some types of exploits which are explain blew;
1. Virus
2. Trojan
3. Rootkit
4. Worms
5. Spyware
6. Adware
7. Keyloggers
Viruses
 A computer virus is a kind of malicious computer program,
which when executed, replicates itself and inserts its own
code. When the replication is done, this code infects the
other files and program present on your system. These
computer viruses are present in various types and each of
them can infect a device in a different manner .
Trojan Horse
A Trojan or Trojan Horse disguises itself as legitimate software to
trick you into executing malicious software on your computer.
Because it looks trustworthy, users download it, inadvertently
allowing malware onto their device. Trojans themselves are a
doorway. Unlike a worm, they need a host to work. Once a Trojan is
installed on a device, hackers can use it to delete, modify or capture
data, harvest your device as part of a botnet, spy on your device, or
gain access to your network.
Adware
Adware, a contraction of ‘advertising-supported software’, displays
unwanted and sometimes malicious advertising on a computer
screen or mobile device, redirects search results to advertising
websites, and captures user data that can be sold to advertisers
without the user's consent. Not all adware is malware, some is
legitimate and safe to use. Users can often affect the frequency of
adware or what kinds of downloads they allow by managing the pop-
up controls and preferences within their internet browsers or using an
ad blocker.

Worms
One of the most common types of malware worms, spread over
computer networks by exploiting operating system vulnerabilities. A
worm is a standalone program that replicates itself to infect other
computers without requiring action from anyone. Since they can
spread fast, worms are often used to execute a payload a piece of
code created to damage a system. Payloads can delete files on a
host system, encrypt data for a ransomware attack, steal information,
delete files, and create botnets.

Keyloggers
A keylogger is a type of spyware that monitors user activity.
Keyloggers can be used for legitimate purposes for example, families
who use them to keep track of their children's online activity or
organizations which use them to monitor employee activity. However,
when installed for malicious purposes, keyloggers can be used to
steal password data, banking information, and other sensitive
information. Keyloggers can be inserted into a system through
phishing, social engineering, or malicious downloads.
Spyware
Spyware is a form of malware that hides on your device, monitors
activity, and steals sensitive information like financial data, account
information, logins, and more. Spyware can spread by exploiting
software vulnerabilities or else be bundled with legitimate software or
in Trojans.
How to prevents from Exploits?
 Protect vulnerabilities. One of the most ingenious delivery
methods for malware today is by exploit kit.
 Watch out for social engineering. Another top method for
infection is to scam users through social engineering.
 Practice safe browsing. There such a thing as good Internet
hygiene.
 Layer your security. All the safe browsing and careful
vigilance in the world can’t protect you from all the threats
out there.

Question 2
Who are the primary perpetrators of computer crime, and
what are their objectives?

You might also like