Computer Security Risks

Cyber crime falls into 7 basic categories
Click the card to flip 👆
1 / 19
Terms in this set (19)
Worma software program capable of reproducing itself that can spread from one computer to the next over a network. It uses up resources, possibly shutting down a computer or network.TrojanHides or looks like a legitimate programRootkitprogram that hides in a computer and allows someone from a remote location to take full control of the computerMalwaresoftware that is intended to damage or disable computers and computer systems.Botnetsa set of computers that are penetrated by malicious software known as malware that allows an external agent to control their actionsBackdoorsUsed to access programs by administrators but can be found by hackers with malicious intent.Denial of Service AttacksThe attacks purpose is to disrupt computer access to the Internet or email. The users computer continues to slow down until it becomes unusable.Firewallshardware, software, or both designed to prevent unauthorized persons from accessing electronic informationWireless Securityrefers to the unique threats and defenses associated with wireless computer networks