Respuesta :
Answer:
1. This event can occur because:
- exchanging file folders utilizing
- USB transmission of false ant viruses fake codec emails through your app browsing infected websites
- installing infected software etc.
2.
The worst that will happen with such an event is:
- key-logger: program capable of capturing and recording keystrokes from users.
- Backdoor: Tool secret to circumvent desktop workstation encryption programs.
- Zombie: internet-connected device which has been hacked.
- Denial-of-service attack (DOS attack): effort to unavail a computer resource
3.
- It robs private information including email accounts, phone numbers, credit card numbers, etc.
- This removes the files, or changes them.
- Tries to steal the identification numbers for the device and uses our machines as relays.
4.
- Use up-to-date antivirus that constantly analyzes your system's actions.
- Create a great malware scanner to evaluate the actions of the software to detect changes through using sandbox testing hash algorithm methods.
- Change your passwords often.
- Should not open any unwanted attachments to e-mail. Watch out for pop-up windows which ask you to download something (such as anti-virus software) when you just browse the internet.
- Maintain up-to-date program. Newer systems auto-update.
- Firewall: program that inspects transiting network traffic and refuses or permits transit based on a set of guidelines.
5.
Key points outline:
- malware circumstances.
- Insights on risks and/or vulnerabilities.
- Possible consequences, and possible intellectual property publicity.
- Anti-vulnerability countermeasure