, Illegally monitoring computer.

Assignment Details:

In an essay, answer the following questions based on the readings from this module:

Provide information from your readings to support your statements.

Deliverables:

Your essay should be 4-5 pages in length, incorporating at least two academic resources from the Library in addition to the case study. Cite all sources using Saudi Electronic University academic writing standards and APA style guidelines found in the Library, citing references as appropriate.

Answer preview

computer allowing unauthorized access of the computer. Banking details, passwords and IP addresses are among the personal information that can be stolen once under Trojan attack. Keyloggers are installed thereby enabling stealing of personal information. This malware mainly targets physical keyboards. Ransomware locks the computer from inside thereby blocking access to the data with threats of relaying them or deleting them until a ransom is paid. Rootkits are a collection of software which has been designed to ensure access of malware into the computer. They function in the background making it difficult to suspect any malicious activity. They can install themselves automatically or grant the attackers administrative privileges making the computer vulnerable to data loss.

[1396 Words]

Scroll to Top