Show
What programs allow unauthorized access directly to a compromised computer?A Trojan horse, or “Trojan”, enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware. As soon as you install a Trojan, you are giving cyber criminals access to your system.
What is a software program that secretly collects information and monitors your actions?Spyware, also known as "adware," is software that sends information from your computer to a third party without your consent. Besides secretly monitoring a user's behavior, spyware collects personal information, which could lead to identity theft.
What is the name of program that contains another hidden and malicious program?Trojan. A Trojan disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims' systems for malicious purposes.
What is a software that blocks threats to your computer called?Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
|