2. A computer virus is a type of malicious
software program ("malware") that, when
executed, replicates itself by modifying other
computer programs and inserting its own
code. Infected computer programs can
include, as well, data files, or the "boot"
sector of the hard drive.
3. Antivirus software is a type of utility used for
scanning and removing viruses from your
computer. While many types of antivirus (or
"anti-virus") programs exist, their primary
purpose is to protect computers from viruses
and remove any viruses that are found.
Example: K7, Avast, Quick heal, McAfree,
Norton etc.
4. A firewall is a network security system, either
hardware- or software-based, that uses rules
to control incoming and outgoing network
traffic.
5. Spyware may be installed on a user's
computer to collect personal information or
monitor internet browsing activities.
An example of spyware is a adware software
program that records a user's keystrokes on
online advertisements and reports them to a
research or ad firm.
6. Anti-spyware software is a type of program
designed to prevent and detect
unwanted spyware program installations and
to remove those programs if installed.
7. A form of spyware that collects information
about the user in order to display
advertisement I the web browser based on
the information it collect from the user’s
browsing patterns.
8. This is software designed to secretly access a
computer system without the owner’s
consent. A malware can be installed in many
way.
9. Phishing is the attempt to obtain sensitive
information such as usernames, passwords,
and credit card details (and money), often for
malicious reasons, by E-mail.
10. Vishing (voice or VoIP phishing) is an
electronic fraud tactic in which individuals are
tricked into revealing critical financial or
personal information to unauthorized
entities. Vishing works like phishing but does
not always occur over the Internet and is
carried out using voice technology.
A vishing attack can be conducted by voice
email, VoIP (voice over IP), or landline
or cellular telephone.
11. Fraud devices attached to or inserted into
cash machines and designed to steal card and
PIN data.
12. Install and use Anti virus software.
Take care when reading email with attachment.
Install and use a firewall program.
Make a backup of important files and folder.
Use strong password.
Use care when downloading and installing
program.
13. Don’t talk to unknown persons.
Don’t share your password to other persons.
Don’t give respond to any message that in
any way make you feel uncomfortable.
Don’t share personal images to unknown
persons,