Dangers on the Internet

¡Supera tus tareas y exámenes ahora con Quizwiz!

Trojan Horse

A malware fronting to perform a good task, but covertly performs undesirable function with the intention of entering the computer without the user's consent.

Computer Worm

It is a dangerous computer program that replicates itself. It is usually spread through email and running of attachments from suspicious sources

Computer Virus

It is a program that duplicates itself and then infects the computer. It spreads like a biological virus. It can be transferred by the use of removable storage media devices.

Hacker

This is a person who is able to enter and control other people's computer without authorization.

Email Spam

Usually unsolicited commercial email sent from an unknown source with identical message sent to multiple recipients.

Spyware

can monitor and collect information about the user's internet habits and practices.

Pharming

dangerous hacker attack on a website which directs all traffic to that website to another fictitious website.

Email Spoofing

deceitful email practice in which the sender address is changed

Phishing

deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appear as if it comes from a trustworthy source

Pharming

exploit the Domain Name Service (DNS) system

Spyware

is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user.

Email spoofing

is usually used by spammers to hide the origin of the spam.

Pharming

main objective is to obtain username and passwords, as well as credit cards ad financial information, and use these to steal their money electronically

Junk mail

other term for email spam


Conjuntos de estudio relacionados

Equitable Remedies and Remedies at Law

View Set

Honors Biology final All Chaptor questions that could be on the test

View Set

Lecture 2- Prebiotics, Probiotics and fermented Foods

View Set