Describe in detail the steps to avoid malware infections on websites, social media, email, Flash memory storage, pop-up windows, and software.

What will be an ideal response?


Student responses will vary, but should be drawn from the following information from the text.?The following guidelines can be used to minimize the chance of your computer or mobile device becoming infected with malware:??• Social media: Malware authors often focus on social media, with the goal of stealing personal information, such as passwords, profiles,  contact lists, and credit card account details. Their websites urge unsuspecting users to take surveys, tap or click links to obtain free  merchandise and games, and download antivirus programs. Ignore these deceitful tactics.?• Email: Spam (unsolicited email messages) can be loaded with malware, but even email messages from friends can be a culprit. If the  message does not contain a subject line or contains links or an attachment, exercise caution. One option is to save the attachment to your  computer so that antivirus software can scan the file for possible malware before you open it. Your best practice is to avoid opening suspicious
messages at all costs.?• Flash memory storage: Colleagues and friends may hand you a USB flash drive or memory card with software, photos, and other files. Scan these media with security software before opening any files.?• Pop-up windows: At times, a window may open suddenly (called a pop-up window), with a warning that your computer is infected with a virus or that a security breach has occurred, and then make an urgent request to download free software to scan your computer or mobile
device and correct the alleged problem. Beware. Many of these offers actually are rogue security software that will infect a computer.?• Websites: Websites you visit or pop-up windows may present instructions to download new software or update current programs installed on a computer or mobile device. If you are uncertain of their legitimacy, exit and research the software by reading reviews online before you
decide to install it.?• Software: Occasionally, some seemingly safe software attempts to install malware. Even worse, some software touted as offering malware protection actually installs more malware. Always obtain software from reputable sources and, if possible, update software directly from manufacturers' websites. Consider using the custom installation option to ensure that only the desired software is installed. Read the  permissions dialog boxes that are displayed on your screen before tapping or clicking the OK or Agree buttons. If you are uncertain about the messages you are viewing, cancel the installation.?• Smartphones: Malware creators are targeting smartphones, particularly those using the Android operating system. While an estimated 80 percent of all smartphones are unprotected now, savvy users are obtaining protection from malware attacks. Read reviews before downloading antimalware apps from trusted sources.

Computer Science & Information Technology

You might also like to view...

Use the th element to indicate a table column or row _____.

a. data b. heading c. summary d. caption

Computer Science & Information Technology

Which of the following is a bibliographic source?

A. map B. memo C. letter D. all of the above

Computer Science & Information Technology

Word automatically corrects misspelled words and displays the corrected word when you press the ____________________ or type a punctuation mark.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not true about standard equipment racks?

A. They provide safe platforms for all the different components. B. All equipment racks are 19 inches wide. C. All equipment racks are floor-to-ceiling and should be bolted into the wall. D. Equipment racks come in various heights, from two or three feet high to floor-to-ceiling height.

Computer Science & Information Technology