Which Internet threats that disguised as a useful program and allows hackers to get your information?

c.Trojan– a malicious program that disguised as a useful program butonce downloaded or installed, leaves your PC unprotected and allowshackers to get your information.

Internet Threats:Rogue security software – tricks the user into posing that it is a securitysoftware. It asks the user to pay to improve his/her security but in reality,they are not protected at all.d. Spyware –a program that runs in the background without you knowing it( thus called “spy “). It has the ability to monitor what you are currently doingand typing through keylogging.Keyloggers –used to record the keystroke done by the user. This is done tosteal their password or any other sensitive information. It can record email,messages, or any information you type using keyboard.e. Adware– a program designed to send your advertisements, mostly as pop-ups

Internet Threats:2. Spam– unwanted email mostly from bots or advertisers.It can be used to send malware.3. Phishing– Its goal is to acquire sensitive personalinformation like passwords and credit card details.Pharming– a more complicated way of phishing where itexploits the DNS ( Domain Name Service ) system.

Protecting Reputations OnlineReminder:Once you post something over the internet, searchengines keep in their archives for search results. Thismakes anything you post to last forever even if youdelete it in your page. Something you and your friendsfind funny toady may be something that could harmsomeone’s reputation later.

Think Before You Click1. Before you post something on the web,ask these questionsto yourself: Would you want your parents or grandparents to seeit? Would you want your future boss to see it? Once you postsomething on the web, you have no control of who sees yourposts.2. Your friends depend on you to protect their reputation online.Talk to your friends about this serious responsibility.3.Set your post to “private.”In this way, search engines willnot be able to scan that post.4.Avoid using names. Names are easy for search engines toscan.5. If you feel that a post can affect you or other’s reputation, askthe one who posted it to pull it down or report it asinappropriate.

COPYRIGHT INFRINGEMENTIf you create something—an idea, an invention, aform of literary work, or a research, you have theright of how it should be used by others. This iscalledintellectual property.Copyright law includes your rights over yourwork, and anyone who uses it without yourconsent is punishable by law.

Tips that could you avoid copyright infringement1.Understand. Copyright protects literary works,photographs, paintings, drawings, films,music ( and lyrics ),choreography, and sculptures, but it generally does notprotect underlying ideas and facts. This means that you canexpress something using your own words, but you shouldgive credit to the source.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

Macro Virus: These type of virus infects word, excel, PowerPoint, access and other data files. Once infected repairing of these files is very much difficult.

Master boot record files: MBR viruses are memory-resident viruses and copy itself to the first sector of a storage device which is used for partition tables or OS loading programs .A MBR virus will infect this particular area of Storage device instead of normal files. The easiest way to remove a MBR virus is to clean the MBR area,

Boot sector virus: Boot sector virus infects the boot sector of a HDD or FDD. These are also memory resident in nature. As soon as the computer starts it gets infected from the boot sector.  Cleaning this type of virus is very difficult.

Multipartite virus: A hybrid of Boot and Program/file viruses. They infect program files and when the infected program is executed, these viruses infect the boot record. When you boot the computer next time the virus from the boot record loads in memory and then start infecting other program files on disk

Polymorphic viruses: A virus that can encrypt its code in different ways so that it appears differently in each infection. These viruses are more difficult to detect.

Stealth viruses: These types of viruses use different kind of techniques to avoid detection. They either redirect the disk head to read another sector instead of the one in which they reside or they may alter the reading of the infected file’s size shown in the directory listing. For example, the Whale virus adds 9216 bytes to an infected file; then the virus subtracts the same number of bytes (9216) from the size given in the directory.

Which malware is disguised as a useful program but once downloaded and installed it allows hackers to get your information?

Trojan Horse A Trojan horse, or “Trojan”, enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware. As soon as you install a Trojan, you are giving cyber criminals access to your system.

Which type of malware enables a hacker to collect personal information a user enters?

Spyware, on the other hand, is a type of malware designed to gain access and damage your computer. Spyware, on the other hand, collects user's information such as habits, browsing history, and personal identification information.

What spyware means?

Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising.

Is a Trojan a virus or malware?

A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program.