Ch16 Security Flashcards
Virus
Code that runs on a computer without the user’s knowledge; it infects the computer when code is accessed and executed.
Worm
Similiar to viruses except that it self-replicates.
Trojan Horse
Appears to perform legitimate function but are actually performing malicious functions behind the scenes.
Spyware
Malicious software either downloaded unwittingly from a website or installed along with some other third-party software.
Rootkit
Software designed to gain administrator-level control over a computer system without being detected.
Spam
The abuse of electronic messaging systems such as e-mail, broadcast media, and instant messaging.
Clearing
Removal of data with a certain amount of assurance that it cannot be reconstructed.
Purging
aka sanitizing; removal of data done in such a way that the data cannot be reconstructed. may use bit-level erasure software to completely destroy all data on the media.
What type of malware self-replicates
worm
What type of malware is the abuse of electronic messaging systems?
Spam
List three symptons of viruses?
- Computer runs slowly.
- Computer lock ups.
- Unusual error messages are displayed.
What is the science of recognizing humans based on physical characteristics?
biometrics
A hard drive needs to be disposed of in a way so taht no one can access the data.
Which method should you use?
Destruction
Which is the best mode to use when scanning for viruses?
safe mode.
What are five ways to prevent spyware?
- Adjust Internet Explorer security settings.
- Install antispyware software.
- Uninstall unnecessary applications and services.
- Educate users on how to surf the web safely.
- Consider technologies that discourage spyware.