20 terms

Unit 6 Viruses & Destructive Programs Test Review

Computer Virus
A computer program written to alter the way a computer operates.
Viruses can . . .
corrupt files; destroy data, display messsages, corrupt systems
Types of viruses
Trojan Horse, worm, bootsector, macro memory, rootkit, logic bomb, time bomb
How viruses are spread
Email, websites, networks, phishing, hackers, messaging, mobile devices, friends and family
Protect your computer
Anti-virus software, avoid rogue websites, don't open suspicious attachments, etc.
Use at least seven characters and include symbols, upper and lower case letters
Finding weaknesses in a computer system with the intention of doing damage.
Internet Controls
Firewalls, filters and parental controls
Copyrighted software which is made available without charge.
Software that can be used free of charge for a period of time then a charge is applied.
Trojan Horse
Malware that masquerades as legitimate while doing damage to a computer system.
Malware program that replicates itself in order to do damage computer to computer.
Dictionary attack
Destructive program designed to discover personal/computer passwords.
File Virus
Type of virus that inserts a destructive code into executable files.
Short of malicious software. Example: Trojan Horse.
Software designed to embed advertisements into applications being used.
Software that gathers user information through the user's Internet connection without his knowledge.
Phishing & Spoofing
Actions taken through email to falsely gather personal information about the user. Used for identify theft purposes.
Social Engineering
The act of obtaining or attempting to obtain secure data by conning individuals into revealing personal information.
War Driving
Act of driving around in a vehicle with a laptop or other mobile device in order to use unauthorized wireless services for hacking or other unethical purposes.