1. Implement strong password policies.
2. Keep software and systems updated.
3. Train employees in cybersecurity best practices.
4. Use firewalls and antivirus software.
5. Encrypt sensitive data.
6. Implement access controls.
7. Back up data regularly.
8. Develop an incident response plan.
9. Conduct regular security assessments.
10. Utilize multi-factor authentication (MFA).
Spyware : Secretly monitor user activity and collects data.
( example password)
Ransomware: Encrypts a user's files or locks them out of their system, demanding payment to restore access.
Notable (examples include CryptoLocker and WannaCry).
Adware: Displays unwanted advertisements, often redirecting browsers to specific ads or collecting data to
target users with tailored marketing. (example clicking on pop-ups)
Trojans: Malicious software disguised as legitimate applications. Once installed, they can create backdoors, allowing unauthorized access to the system.( example GameThief: Targets online gamers to steal account credentials.)
Viruses: Self-replicating programs that attach to legitimate files, spreading when these files are executed. They can corrupt or delete data and often require user action to initiate.
Worms: Standalone programs that replicate themselves to spread across networks without user intervention, often exploiting vulnerabilities to propagate rapidly(example mydoom: a fast spreading email worm thats windows computer )
Botnets: Networks of infected computers controlled remotely, often used to launch distributed denial-of-service (DDoS) attacks or send spam emails.(examples email spam, the sending of mass amount of span email containing phishing links)