Respuesta :

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

fichoh

Phishing, keylogging and malware are different ways of illegally getting hold of user data to be used for fraudulent activities.

  • Phishing is performed by impersonation, where users or customers of a particular organization or platform are contacted by emails, text or call requesting them to provide sensitive on behalf of the institution.

  • Keylogging occurs when keystrokes of a user is being monitored without consent. The logged or captured keys can be used to log into the individual's information and retrieve sensitive data.

  • Malware involves the use of infected files delivered over a network to carry out cyber attacks capable of capturing tons of data illegally.

  • It is important to withhold sensitive information and contact service providers if any suspicious communication is received.

  • Similarly, visiting unauthorized websites should be avoided and the use of firewalls on computer system should be adopted.

Therefore, phishing, keylogging and malware are ways of perpetrating cyber crime.

Learn more: https://brainly.com/question/19588151?referrer=searchResults