Unit 6 Computer Viruses, Brock

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Worm

A standalone malware that replicates itself and spreads to other computers

Rougue Websites

A virus that may be lurking on infected websites

File Virus

A type of computer virus that inserts its malicious code into executable files on a system

Trojan Horse

A type of malware that looks like a legitimate file or helpful program that gives a hacker access to ta computer

Infected boot disks

A virus can be spread if an infected disk is in your hard drive and you attempt to restart

Spyware

Any software that covertly gathers user info through the user's Internet connection without their kris knowledge, usually for advertising purposes

Boot Sector Virus

Attaches itself to the first part of the hard disk that is read b the computer during th boot up process

Social engineering

Conning an individual into revealing secure info

Filters

Controls what can be viewed on the Internet

Hacking

Finding a weakness in a computer or program with the objective of doing damage or stealing personal info

Firewalls

Forms a barrier between networks

Malware

Short for malicious software, designed specifically to damage or disrupt a system, such as a virus or Trojan horse

Parental Controls

Software allows parents to control what kids do on the Internet

Freeware

Software that is downloaded at no charge to the user

Adware

Tcommon name used to describe software that is given to the user with advertisments purposes

War driving

The act of driving around in a vehicle with a laptop computer, an antenna, and an 802.11 wireless LAN adapter to exploit existing wireless networks

Phishing

The act of sending an e-mail to a user as a false enterprise

Hackers

The best way to protect yourself is to have a firewall and up to date antivirus software installed at the same time

Dictionary Attack

Uses a technique to successfully try all the words in a list called a dictionary to find out passwords on a computer system

Spoofing Attacks

When a malicious party impersonates another device or user on a network in order to launch attacks, can steal data, spread malware, etc.

Shareware

A charge for a software after a free trial

Computer Virus

A computer virus that can replicate itself

Email Attachments

May be carried in attachments to email messages

Logic Bombs

Programmed to initiate at a specific date or when a special event occurs


Ensembles d'études connexes

Inleiding in de Psychologie Gray&Bjorklund Deel 11 Hoofdstuk 9-17

View Set

Pharm Made Easy: Reproductive & Genitourinary System

View Set

Life in Modern Britain- Citizenship GCSE

View Set