You are on page 1of 1

1. COMMENT SPAM: Comment spam is used to build backlinks.

TRACKBACK SPAM: rackbacks were created with the intention of being useful. In a way, they are. Their purpose is
to notify the webmaster of new backlinks by creating a link back to the source of the backlink.
NEGATIVE SEO ATTACK: A negative SEO Attack is a type of SPAM that can really harm you and your business. It’s
purpose is to make Google think that you’re the one performing BlackHat SEO tactics. It’s usually the work of nasty
competitors trying to pull you down instead of lifting them up.
SPICERS, BOTS DDoS ATTACKS: Bots and Spiders come to your website for various reasons. It’s either a search
engine crawler, or a tool trying to get information from your website, such as what sites you’re linking to.
E-MAIL SPAM:
E-mail Spam is really hard to fight against. If your e-mail gets on the hands of just one mass spammer, it’s pretty
much compromised. Luckily for us, Google does a pretty good job at differentiating spam from real, useful e-mails.

2. Scammers use email or text messages to trick you into giving them your personal information. They may try to
steal your passwords, account numbers, or Social Security numbers.
3. Set the software to update automatically so it can deal with any new security threats. Back up your data and
make sure those backups aren’t connected to your home network. You can copy your computer files to an external
hard drive or cloud storage. Back up the data on your phone, too.
4. ADWARE: Common examples of adware include pop-up ads on websites and advertisements that are
displayed by software.
BOT: Bots are software programs created to automatically perform specific operations.
BUG: In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result
of human error and typically exist in the source code or compilers of a program.
VIRUS: A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses
often spread to other computers by attaching themselves to various programs and executing code when a user
launches one of those infected programs.
WORMS: Computer worms are among the most common types of malware. They spread over computer networks
by exploiting operating system vulnerabilities. Worms typically cause harm to their host networks by consuming
bandwidth and overloading web servers.
5. a.)Install and run anti-malware and firewall software. When selecting software, choose a program that offers
tools for detecting, quarantining, and removing multiple types of malware. At the minimum, anti-malware software
should protect against viruses, spyware, adware, Trojans, and worms. The combination of anti-malware software
and a firewall will ensure that all incoming and existing data gets scanned for malware and that malware can be
safely removed once detected.
b.)Keep software and operating systems up to date with current vulnerability patches. These patches are often
released to patch bugs or other security flaws that could be exploited by attackers.
c.)Be vigilant when downloading files, programs, attachments, etc. Downloads that seem strange or are from an
unfamiliar source often contain malware.

You might also like