Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 8: COMPUTER ISSUES - Coggle Diagram
CHAPTER 8: COMPUTER ISSUES
What is a personal firewall
Program that protects personal computer and its data from
unauthorized intrusions
Monitors transmissions to and from computer
What is an antivirus program
Most also protect against worms , Trojan horses, and spyware
Identifies and removes computer viruses
What is a firewall?
Security system consisting of hardware and/or software that
prevents unauthorized intrusion
What is a computer security risk?
Event or action that causes loss of or damage to computer system
Internet and Network Attacks
Corporate spies have excellent computer and networking skils
Unscrupulous companies hire corporate spies, a practice known as corporate espionage to gain competitive known as copertive advantage
hired to break into a specific computer and steal its proprietary data and information or to help identify security risks in their own organization.
What are some tips for preventing virus, worm, and
Trojan horse infections
Never start a computer with removable media inserted
Install an antivirus program on all of your computers
Never open an e-mail attachment unless you are expecting it
and it is from a trusted source
If the antivirus program flags an e-mail attachment as
infected, delete the attachment immediately
Check all downloaded programs for viruses, worms, or Trojan
horses
What are viruses, worms, and Trojan horses?
Virus is a potentially damaging computer program
Worm copies itself repeatedly, using up resources and
possibly shutting down computer or network
Payload (destructive event) that is delivered
Trojan horse hides within or looks like legitimate program
until triggered
What is a user name?
Password is private combination of characters associated
with the user name that allows access to computer resources
How does an antivirus program inoculate a program
file
Records information about program such as file size and creation dtae
Quarantines infected files that it cannot remove
Uses information to detect if virus tampers with file