A few computers at a high-security software firm location have been compromised. The threat actor took user videos, confidential information like bank account IDs and passwords, email IDs and passwords, and computer screenshots. These confidential data have been shared every three hours from the computers to the threat actor. Which of the following is correct, based on the evaluation of the above observation?
A. This is a software keylogger attack, as it is sharing the information every three hours to the attacker.
B. This is a hardware keylogger attack; it is only periodically sharing the information and is a manual transfer of information by a human agent.
C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.
D. This is a hardware keylogger attack, as video capture functionality and periodic transfer of data are not possible with a software keylogger.

Respuesta :

Lanuel

Based on an evaluation of the above observation: C. This is a software keylogger attack, as screenshots, video captures, and keystrokes have been routinely monitored and periodically shared.

What is a keylogger?

A keylogger is also referred to as a keystroke logger or keyboard capture and it can be defined as an activity-monitoring software application (program) that is designed and developed to monitor, record and share a user's personal data with a cyber attacker or hacker.

The types of keylogger.

In Cybersecurity, there are two main types of keylogger and these include:

  • Hardware keylogger
  • Software keylogger

In this scenario, a software keylogger attack took place because screenshots, video captures, and keystrokes were routinely monitored and periodically shared with the threat actor (attacker).

Read more on keylogger here: https://brainly.com/question/17231901