Anti-virus software scans devices for viruses and removes them if found.
Malware can be installed on your device by clicking on links or downloading files from the internet, opening email attachments, using unlicensed software, or connecting an infected USB drive.
A virus is malicious code that spreads from one computer to another.
Firewalls are used to prevent unauthorised access to networks by blocking incoming traffic from the internet that does not meet predetermined criteria.
Trojan horse programs are disguised as useful applications but contain hidden malicious code.
Spyware monitors user activity and sends information back to its creator.
Password policies ensure strong passwords are created and changed regularly.
Worms replicate themselves across networks without human intervention.
Firewalls are used to prevent unauthorized access to a network.
Encryption is the process of converting data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal sensitive information.
A firewall is a hardware or software system that monitors incoming and outgoing traffic based on predetermined rules.
To protect against malware, use anti-malware software, keep it up to date, avoid suspicious websites, emails, and attachments, only install licensed software, and scan any new external storage devices with antivirus software.
Intrusion detection systems (IDS) monitor network activity and alert administrators when suspicious behaviour occurs.
Spyware monitors user activity without their knowledge and sends information back to its creator.
Encryption converts data into a secret code so it cannot be read without decrypting it with a key.
Data loss prevention (DLP) tools scan data as it enters or leaves a system to detect sensitive information and block its transmission unless authorised.
Adware displays unwanted adverts on websites visited by users.
Adware displays unwanted adverts on websites visited by users.
Anti-virus software detects viruses on computers and removes them.
Encryption converts data into coded form so it cannot be read without decoding.
Ransomware encrypts data on a victim's device until they pay money to unlock it.
Encryption converts data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal.
Antivirus software is installed on computers to detect and remove viruses.
Data backup involves copying important files onto external storage devices such as USB drives or cloud services like Google Drive.
Encryption converts data into an unreadable format using complex algorithms, making it difficult for attackers to read or steal sensitive information.
Data backup involves copying important data onto other storage media such as CD/DVD, external hard drives, cloud services, or network attached storage (NAS).
Antivirus software scans files for known viruses and removes them from infected systems.
Data backup involves creating copies of important data on separate devices to protect against loss due to hardware failure or cyber attacks.
Access control systems restrict access to resources based on authorized users' identities.
Antivirus software scans files and programs for known viruses and malware, removing them if found.
Access control limits who can access specific resources within a system based on their level of authorization.
Anti-virus software scans files for known viruses and removes them if found.
Social engineering involves tricking people into revealing confidential information through deception.
Anti-spyware software can be installed to detect and remove spyware from your computer.
Data backup involves creating copies of important data to protect against loss due to accidents, theft, or other incidents.
Social engineering attacks involve tricking people into revealing confidential information through phishing emails, phone calls, or fake websites.
Access control systems limit access to specific areas or resources within a computer system or network.
Pharming involves redirecting users from legitimate websites to fraudulent ones by changing DNS settings.
Anti-virus software scans files for viruses and removes them if found.
Phishing attacks involve sending fake emails from reputable sources to trick users into providing personal details.