File
Security and privacy threats in operating systems
Digital Document
Collection(s) |
Collection(s)
|
---|---|
Content type |
Content type
|
Resource Type |
Resource Type
|
Genre |
Genre
|
Language |
Language
|
Persons |
Author (aut): Sharma, Ishaan
Author (aut): Vedi, Kartik
|
---|
Abstract |
Abstract
Operating systems often have built-in defenses against keyloggers, but users should also be cautious and avoid suspicious links or downloads. Keyloggers are software or hardware that record every keystroke made on a computer or device. While they can be used for legitimate purposes, they can also be used maliciously to steal sensitive information such as passwords.
Employing passwords is crucial in ensuring the confidentiality and security of personal and sensitive information in digital environments. The use of strong, unique passwords can prevent unauthorized access and protect against potential data breaches.The use of strong, unique passwords can enhance the security of operating systems and prevent malicious activities such as hacking, data theft, and identity fraud.
Being cautious while clicking on links is crucial in preventing various cyber threats, including phishing scams and malware infections. It is important to avoid clicking on suspicious links or those from unknown sources to maintain the security and integrity of personal and sensitive information.
Poster was presented at the Coquitlam campus on April 5, 2023, for Student Research Days 2023. |
---|
Conference/Events |
Conference/Events
|
---|
Physical Description Note |
Physical Description Note
OTHER
|
---|
Use and Reproduction |
Use and Reproduction
© Authors.
|
---|---|
Rights Statement |
Rights Statement
|
Cite this
Language |
English
|
---|---|
Name |
Security and privacy threats in operating systems
|
Authored on |
|
MIME type |
application/pdf
|
File size |
1569507
|
Media Use |