Describe how hackers, viruses, and malware can cause havoc to your computer system, and explain how to protect against such threats

What will be an ideal response?


A hacker breaks into computer systems without permission with the intent of accessing secure or private information and uses the information for their own benefit or sells it for a profit. A computer virus is a program that attaches itself onto another program and spreads to other computers when files are exchanged. Viruses can either cause significant damage to a system, or merely be annoying. Malware, includes adware, spyware, and scareware. Adware are software programs that track your online behaviors and push unwanted advertisements to you as you browse the Web or sell it to third parties. Usually, the user has accepted terms to have the adware run in the background. Spyware tracks your online behavior without your consent and can be more intrusive. Scareware displays notification warnings that your computer is infected and prompts you to buy fake removal tools. Using antivirus software, antispyware software, and ensuring your computer is protected by an active firewall can help manage and avoid these online invaders.

Computer Science & Information Technology

You might also like to view...

The name of the active layer displays on the ____ of the document window in Photoshop.

a. status bar b. title bar c. Application bar d. options bar

Computer Science & Information Technology

Define the terms arguments and parameters. How are they different?

What will be an ideal response?

Computer Science & Information Technology

The ________ is a tool in the Office 365 calendar that allows the user to determine a time when others are free to attend a meeting

Fill in the blank(s) with correct word

Computer Science & Information Technology

Design studio Rizco is concerned with sustainable design. What do you know about sustainable design?

What will be an ideal response?

Computer Science & Information Technology