Virus

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Back Door Attacks

A back door attack is where it targets the weaknesses in the server software that is running on your computer.

Whitehat Computer Hackers

Whitehat computer hackers look for flaws in the software and try to fix them or attempt to break into their computer to destroy their security.

World Wide Damage

Damages from just one virus (The I Love You Virus) are estimated at $10 billion dollars

Defence Against Attacks

Even if you are not Whitehat hacker there is a lot you can do to defend your computer against attack. Defending against front door attacks means being careful about what programs you run and what attachments and links you open. Defending against back door attacks means knowing what services are running on your machine and keeping them patched.

Computer Virus

A software is capable of causing great harm to files or other programs on the same computer.

Anti-Virus

Anti-Virus is used to keep viruses from accessing your files and damaging them and even corrupting your data.

Blackhat Computer Hackers

Blackhat computer hackers secrets in the software to exploit them or hack into the computer for malicious reasons.

Worm Virus

It is a computer virus that makes many copies of itself resulting in consumption of system resources which slows down or actually halts tasks. A worm virus often uses a computer network to spread itself. It relies on security failures on the target computer to access it. It doesn't need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Recovering from attacks

No matter how careful you are it is still a good idea to prepare to recover from an attack if one does occur. Back up personal data and keep track of software installed.

Antivirus Software

Norton AVG Avast

Self-Replicating

Self-replicating software is a type of software that will copy itself throughout a computer system.

Server Software

Server software is a software that listens for requests and arrives over the network.

Malware

Software designed to infiltrate or damage a computer system without the user's informed consent. Software that is intended to damage or disable computers and computer systems. Malware, short for malicious software, its software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

Spyware

Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user. Software that self-installs on a computer, enabling information to be gathered covertly about a person's Internet use, passwords, etc. "Spyware" is mostly classified into four types: system monitors, trojans, adware, and tracking cookies. Spyware is mostly used for the purposes such as; tracking and storing internet users' movements on the web; serving up pop-up ads to internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect.

Trojan Virus

The Trojan virus hides inside other software, usually as an attachment or a downloadable file. Also a Trojan virus is something that usually hides in a file or in some downloadable files.Trojans do not attempt to inject themselves into other files like a computer virus. Trojan viruses may steal information, or harm their host computer systems.

Front Door Attacks

The user is tricked into opening the front door for the attack for their action.


Set pelajaran terkait

adaptive quizzing 22, 23, 24, 25

View Set

Economics ch 6 Monopoly and Monopolistic Competition

View Set

Med Surg 1 Lewis Ch. 20, ATI lab values 2017, Med/Surg: Evolve Chapter 33, Evolve Med surg practice questions, Chapter 46 Bowel Elimination, Chapter 40 - OXYgenation, Fluids and Electrolytes Chapter 41, Chapter 45 Urinary Elmination, Med/Surg: Chapte...

View Set

English: "Apple and Branding - What Can We Learn?"

View Set

MAN 4143 Exam 2 Quizzes and Homework CH 6,7,8,9

View Set