Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Worms

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

Keylogger

A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.

Viruses

A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Denial of service (DOS)

An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

Hacking

Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking.

Online Fraud

Online fraud comes in many forms. It ranges from viruses that attack computers with the goal of retrieving personal information, to email schemes that lure victims into wiring money to fraudulent sources, to "phishing" emails that purport to be from official entities (such as banks or the Internal Revenue Service) that solicit personal information from victims to be used to commit identity theft, to fraud on online auction sites (such as Ebay) where perpetrators sell fictional goods. The methods used by perpetrators of online fraud are constantly evolving.

Spyware

Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Phishing

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

Identity Theft

The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.

Trojans

Trojans are malicious programs that perform actions that have not been authorized by the user. These actions can include: Deleting data Blocking data Modifying data Copying data Disrupting the performance of computers or computer networks Unlike computer viruses and worms, Trojans are not able to self-replicate.


Set pelajaran terkait

Improve - Six Sigma Root Cause Analysis and Waste Elimination

View Set

ICP 1 Moles and Molar Mass & Types of Reactions

View Set

Prep U Chapter 16: Outcome Identification and Planning

View Set

Fluid, Electrolyte, and Acid-Base Balance: Chapter 39 (Taylor)

View Set

PRINTING WORKSHEETS AND WORKBOOKS

View Set