Unit 6 Terminology Assignment Review S3 obj 1 - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Unit 6 Terminology Assignment Review S3 obj 1

Description:

VIRUSES & DESTRUCTIVE PROGRAMS UNIT 6 TERMINOLOGY ASSIGNMENT REVIEW S3 OBJ 1 COMPUTER VIRUS A computer virus is a computer program that can replicate itself and ... – PowerPoint PPT presentation

Number of Views:131
Avg rating:3.0/5.0
Slides: 15
Provided by: Jennife1349
Category:

less

Transcript and Presenter's Notes

Title: Unit 6 Terminology Assignment Review S3 obj 1


1
Unit 6 Terminology Assignment ReviewS3 obj 1
Viruses Destructive Programs
2
Computer Virus
  • A computer virus is a computer program that can
    replicate itself and spread from one computer to
    another. The term "virus" is also commonly, but
    erroneously, used to refer to other types of
    malware, including but not limited to adware and
    spyware programs that do not have a reproductive
    ability.

3
Trojan Horse
  • A Trojan horse, or Trojan, is a type of malware
    that masquerades as a legitimate file or helpful
    program with the ultimate purpose of granting a
    hacker unauthorized access to a computer.

4
Worm
  • A computer worm is a standalone malware computer
    program that replicates itself in order to spread
    to other computers. Often, it uses a computer
    network to spread itself.

5
Dictionary Attack
  • A dictionary attack uses a targeted technique of
    successively trying all the words in an
    exhaustive list called a dictionary to find out
    passwords on a computer system.

6
File Virus
  • A type of computer virus that inserts its
    malicious code into executable files on a system.

7
Malware
  • Short for malicious software, software designed
    specifically to damage or disrupt a system, such
    as a virus or a Trojan horse.

8
Adware
  • Adware is the common name used to describe
    software that is given to the user with
    advertisements embedded in the application.

9
Spyware
  • Any software that covertly gathers user
    information through the user's Internet
    connection without his or her knowledge, usually
    for advertising purposes.

10
Freeware vs. Shareware
  • Freeware is software downloaded at no charge to
    the user. There may be a charge for Shareware
    after a trial period.

11
Phishing Spoofing Attacks
  • The act of sending an e-mail to a user falsely
    claiming to be an established legitimate
    enterprise in an attempt to scam the user into
    surrendering private information that will be
    used for identity theft.

12
Social Engineering
  • In the realm of computers, the act of obtaining
    or attempting to obtain otherwise secure data by
    conning an individual into revealing secure
    information. Social engineering is successful
    because its victims innately want to trust other
    people and are naturally helpful.

13
War Driving
  • The act of driving around in a vehicle with a
    laptop computer, an antenna, and an 802.11
    wireless LAN adapter to exploit existing wireless
    networks.

14
  • Use your notes to study for the test!

Did you do the EXTRA Credit Wordle Assignment?
Write a Comment
User Comments (0)
About PowerShow.com