1. Common types of malicious software include viruses, worms, Trojan horses, andspyware. A keylogger is a type of spyware that records the keystrokes of the user.Many of these types of malicious software are used in bank fraud-relatedactivities. The ‘man-in-the-middle’ attack is most often executed by a Trojaninstalled on the user’s system.
  2. Examples might include a person question you need to answer to change yourpassword for a site (a personal factor), a retinal scanner (a human factor), andthe ZTIC (a technical factor).
  3. One drawback of the device is that while the Internet is ubiquitous, you wouldneed to bring the ZTIC everywhere you go to safely perform banking transactionsanywhere, anytime.
  4. Though the ZTIC might prevent attackers from performing any transactionsthemselves, more emphasis might be placed on acquiring other information fromthe user’s hard drive, like account numbers, balances, and other transactiondetails.
  5. While students may be inclined to say that malware is only a temporaryphenomenon and is likely to be outpaced by preventive technologies, it’s notlikely this will happen. Too many people do not take eFcient care of theircomputers for malware to die out completely.

 

Leave a comment