cache, which is programmed to be routinely flushed. The malware may be installed via a drive-by-download process (Ghosh, 2010). There are many other ways to set traps without the user’s knowledge some of those include Trojans, Virus, Worm, Pharming, Phishing. All of these cause harm to your computers and can cost companies and businesses thousands of dollars to fix. Preventing Security Breaches In order to create a fraud free environment companies and customers should have a general awareness of fraud…
Words 722 - Pages 3