1 / 14

Unit 6 Terminology Assignment Review S3 obj 1

Viruses & Destructive Programs. Unit 6 Terminology Assignment Review S3 obj 1. Computer Virus.

Download Presentation

Unit 6 Terminology Assignment Review S3 obj 1

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Viruses & Destructive Programs Unit 6 Terminology Assignment ReviewS3 obj 1

  2. Computer Virus • A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

  3. Trojan Horse • A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

  4. Worm • A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself.

  5. Dictionary Attack • A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary to find out passwords on a computer system.

  6. File Virus • A type of computer virus that inserts its malicious code into executable files on a system.

  7. Malware • Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

  8. Adware • Adware is the common name used to describe software that is given to the user with advertisements embedded in the application.

  9. Spyware • Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

  10. Freeware vs. Shareware • Freeware is software downloaded at no charge to the user. There may be a charge for Shareware after a trial period.

  11. Phishing & Spoofing Attacks • The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

  12. Social Engineering • In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful.

  13. War Driving • The act of driving around in a vehicle with a laptop computer, an antenna, and an 802.11 wireless LAN adapter to exploit existing wireless networks.

  14. Use your notes to study for the test! Did you do the EXTRA Credit Wordle Assignment?

More Related