Please enable JavaScript.
Coggle requires JavaScript to display documents.
Types of Threat : (Adware (How to mitigate its effects (Install, run and…
Types of Threat :
Adware
-
Automatically shows adverts, such as pop-ups. It may also be in the user interface of a software package or on an installation screen. Adware, by itself, is harmless: however, some adware may include spyware such as keyloggers
-
-
Ransomware
Holds a computer system captive and demands a ransom, usually money, to release it.
Restricts user access to the computer system by encrypting fils or locking down the computer system. A message is usually displayed to force the user to pay so that the restrictions can be lifted and the user given back access to the data or computer system. It is spread like a worm.
-
-
Rootkit
Designed to remotely access or control a computer system without being detected by the security software or the user.
An installed rootkit can enable a cyber attacker to remotely access files, access/steal data and information, modify software configurations or control the computer system as part of a botnet.
Rootkits are difficult to detect as they are not usually detected by the security software.
Software udates, keeping security software up to date and not downloading suspicious files are the only ways of trying to avoid a rootkit from being installed.
-
-
-
Spyware
Can collect data from an infected computer, including personal information like websites visited, user logins and financial information.
How it works
-
It is often secretly installed on a user’s personal computer without their knowledge. Some spyware such as keyloggers, however, may be installed intentionally to monitor users.
-
Some spyware can change computer settings, which could lead to slow internet connection speeds or changes in web browser settings.
-