Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 8: COMPUTER ISSUES - Coggle Diagram
CHAPTER 8: COMPUTER ISSUES
What is a computer security risk?
Event or action that causes loss of or damage to computer system
What are viruses, worms, and Trojan horses?
Trojan horse hides within or looks like legitimate program until triggered
Payload (destructive event) that is delivered
Worm copies itself repeatedly, using up resources and possibly shutting down computer or network
Virus is a potentially damaging computer program
What is an antivirus program
Most also protect against worms , Trojan horses, and spyware
Identifies and removes computer viruses
How does an antivirus program inoculate a program file
Records information about program such as file size and creation date
Quarantines infected files that it cannot remove
Uses information to detect if virus tampers with file
What are some tips for preventing virus, worm, and Trojan horse infections
Never open an e-mail attachment unless you are expecting it and it is from a trusted source
If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately
Install an antivirus program on all of your computers
Never start a computer with removable media inserted
Check all downloaded programs for viruses, worms, or Trojan horses
What is a firewall
Security system consisting of hardware and/or software that prevents unauthorized intrusion
Internet and Network Attacks
What is a personal firewall
Program that protects personal computer and its data from unauthorized intrusions
Monitors transmissions to and from computer
Corporate Spies
Corporate spies have excellent computer and networking skills.
Unscrupulous companies hire corporate spies, a practice known as corporate espionage to gain competitive advantage.
Hired to break into a specific computer and steal its proprietary data and information or to help identify security risks in their own organization.
What is a user name
Password is private combination of characters associated with the user name that allows access to computer resources