Three threats to system performance, information security and user safety
Unwanted e-mail (often referred to as “spam”) - Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email.
Username and password/PIN should be selected and managed properly to avoid easy disclosure of such information. It should not be kept in places where everyone can get access that is should be kept secret
Malicious programs (including viruses, worms, Trojans, spyware, adware and rogue diallers) - Malicious programs is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. This class includes viruses, worms, Trojans, and other programs used to automatically conduct malicious activity
Username and password/PIN should be selected and managed properly to avoid easy disclosure of such information. It should not be kept in places where everyone can get access that is should be kept secret
Malicious programs (including viruses, worms, Trojans, spyware, adware and rogue diallers) - Malicious programs is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. This class includes viruses, worms, Trojans, and other programs used to automatically conduct malicious activity
Comments
Post a Comment