Describe in detail the steps to avoid malware infections on websites, social media, email, Flash memory storage, pop-up windows, and software.
What will be an ideal response?
Student responses will vary, but should be drawn from the following information from the text.?The following guidelines can be used to minimize the chance of your computer or mobile device becoming infected with malware:??• Social media: Malware authors often focus on social media, with the goal of stealing personal information, such as passwords, profiles, contact lists, and credit card account details. Their websites urge unsuspecting users to take surveys, tap or click links to obtain free merchandise and games, and download antivirus programs. Ignore these deceitful tactics.?• Email: Spam (unsolicited email messages) can be loaded with malware, but even email messages from friends can be a culprit. If the message does not contain a subject line or contains links or an attachment, exercise caution. One option is to save the attachment to your computer so that antivirus software can scan the file for possible malware before you open it. Your best practice is to avoid opening suspicious
messages at all costs.?• Flash memory storage: Colleagues and friends may hand you a USB flash drive or memory card with software, photos, and other files. Scan these media with security software before opening any files.?• Pop-up windows: At times, a window may open suddenly (called a pop-up window), with a warning that your computer is infected with a virus or that a security breach has occurred, and then make an urgent request to download free software to scan your computer or mobile
device and correct the alleged problem. Beware. Many of these offers actually are rogue security software that will infect a computer.?• Websites: Websites you visit or pop-up windows may present instructions to download new software or update current programs installed on a computer or mobile device. If you are uncertain of their legitimacy, exit and research the software by reading reviews online before you
decide to install it.?• Software: Occasionally, some seemingly safe software attempts to install malware. Even worse, some software touted as offering malware protection actually installs more malware. Always obtain software from reputable sources and, if possible, update software directly from manufacturers' websites. Consider using the custom installation option to ensure that only the desired software is installed. Read the permissions dialog boxes that are displayed on your screen before tapping or clicking the OK or Agree buttons. If you are uncertain about the messages you are viewing, cancel the installation.?• Smartphones: Malware creators are targeting smartphones, particularly those using the Android operating system. While an estimated 80 percent of all smartphones are unprotected now, savvy users are obtaining protection from malware attacks. Read reviews before downloading antimalware apps from trusted sources.
You might also like to view...
Which of the following most often includes a touch pad, track ball, or small pointing stick?
A) smartphone B) laptop C) desktop D) microcomputer
If you want a picture to appear on all slides created with the Title and Content layout, the picture should be inserted in ________
A) each slide with the Title and Content layout individually B) in the first slide of the presentation having the Title and Content layout; it will automatically be duplicated to all other slides in the presentation with the same layout C) the Title and Content Slide Master D) in the Title placeholder of the Title Slide Master