BTM 200 Chapter Notes - Chapter 9: Email Forwarding, Gmail, Nondestructive Testing
Document Summary
Module 7: securing your system: protecting your digital data and. Cybercrimes are criminal acts conducted by cybercriminals through the use of computers. Computer users need to protect themselves from becoming victims of cybercriminals. Virus: a program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program. Any computing device can be infected with a virus. Boot-sector viruses: replicate themselves in the boot sector of the hard drive. Logic bombs: activate when certain conditions are met. Time bombs: triggered by the passage of time or on a certain date. Script viruses: hidden on web pages as mini-programs. E-mail viruses: use email address books to distribute themselves. Encryption viruses: compress files using a complex encryption key. Viruses copy themselves and infect a file on your computer. Polymorphic viruses: periodically rewrite themselves to avoid detection. Stealth viruses: erase their code from the hard drive and reside in the active memory.