{
Loading
All Modules View all topics Close topics
Computer Security and Privacy
Previous Topic Previous slide Next slide Next Topic

2.2 Best Practices for Securing Online and Network Transactions

  • Study Reminders

    Set your study reminders

    We'll email you at these times to remind you to study

    You can set up to 7 reminders per week

    You're all set

    We'll email you at these times to remind you to study

    Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +
  • Study Notes
  • Discuss This Topic
    WAI P.
    TH
    WAI P.

    While you are browsing the Internet, it is possible that a software program installed on your computer is transmitting your personal information to a hacker in another country. Such software programs are examples of spyware. These programs generally get installed on your computer without your knowledge and secretly transfers confidential data from your computer to the hackers. Sometimes, employers deliberately install spyware on the computers used by the employees to track the computing activities of the employees. Windows Vista includes a built-in antispyware program called Windows Defender, which helps prevent spyware from getting secretly installed on the computer.

  • Text Version
Notification

You have received a new notification

Click here to view them all