Page 26 - Enchiridion 4.0 program_EN
P. 26

Strategic Partnerships for school education 2019-1-PL01-KA201-065137
                         Project: Teacher4.0 - comprehensive method of implementation of Industry 4.0
                                concept into didactic practice in primary and secondary schools

               total control. There are numerous types of malware, with the list growing every day. Hackers’ efforts
               are increasing in sophistication, so it’s vital to know to protect your digital devices from them.

               Most malware infections occur when the user performs an action that causes the malware to be
               downloaded. This action might be clicking a link in an email, or visiting a malicious website. Also, by
               loading the firmware of a USB stick or flash drive or external hard drives onto the device’s internal
               hardware. In other cases, hackers spread malware through peer-to-peer file sharing services and free
               software download bundles such as screensavers, toolbars or torrents from an untrustworthy source.
               Clicking on pop-ups or downloading pirating software, music, or movies can also install malware on
               the device. Embedding a bit of malware in a popular torrent or download is an effective way to
               spread it across a wide user base. Mobile devices can also be infected via text messages.

               Once the malware has been installed, it infects the digital device and begins working towards the
               hackers’ goals. It’s beneficial to learn about the various types of malware and ways to protect the
               digital devices used by teachers and students to safeguard their personal data from hacker’s attacks.

               1. Spyware
               Spyware is a type of malware designed to allow a hacker to spy on users, gathering information like
               internet activity, login credentials, and more. When a hacker uses spyware, they can gain access to
               any type of sensitive information your users view. This means personal details, card payment
               information, HIPAA-covered data, and more. While spyware is dangerous, it’s fortunately fairly easy
               to remove.

               2. Adware

               Adware is a type of malware that causes ads to show up on your computer in an attempt to generate
               revenue for the ad creator. Sometimes, adware is closely related to spyware and commonly shows
               up in the form of pop-up ads or ads embedded in software or a program.

               3. Ransomware

               Ransomware does exactly what its name describes – holds your computer or device under the
               hacker’s control in an effort to gain ransom money. In this scenario, hackers infiltrate devices with
               ransomware, locking users out unless they pay. In some cases, the ransomware hackers will threaten
               to release sensitive data to the public or on the dark web unless the ransom is paid.
               4. Trojan Horse

               A Trojan horse malware attack is one of the most common kinds of threats. In this attack, hackers
               disguise the malware as something appealing, like a free download, special gift, or exclusive offer.
               Once the disguised malware infiltrates the network, any data can be stolen.

               5. Viruses





                                               This  project  has  been  funded  with  support  from  the  European
                                               Commission. This communication reflects the views only of the
                                               author, and the Commission cannot be held responsible for any
                                               use which may be made of the information contained therein.
   21   22   23   24   25   26   27   28   29   30   31