Distinguish between keystroke loggers, password-stealing spyware, and data mining spyware.

What will be an ideal response?


Answer: Keystroke logger: Captures all your keystrokes

Password-stealing sw: tells you that you have been logged out of the server you are visiting and asks you to retype your user/pass -- then sends this information to attacker.

Data-mining spyware: Searches through your HD for same types of information sought by keystroke loggers, then sends it to attacker.

Computer Science & Information Technology

You might also like to view...

Write a method called maxOfTwo that accepts two integer parameters and returns the larger of the two.

What will be an ideal response?

Computer Science & Information Technology

A ____ background is the easiest to read for most users.

A. white B. light blue C. red D. green

Computer Science & Information Technology

System Restore can restore applications and settings to an earlier point in time, but it does not back up or restore any personal data files

Indicate whether the statement is true or false

Computer Science & Information Technology

In the accompanying figure, item A is used to identify the _______________ for a new folio.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology