BTM 200 Chapter Notes - Chapter 9: Email Forwarding, Gmail, Nondestructive Testing

121 views9 pages

Document Summary

Module 7: securing your system: protecting your digital data and. Cybercrimes are criminal acts conducted by cybercriminals through the use of computers. Computer users need to protect themselves from becoming victims of cybercriminals. Virus: a program that attaches itself to another program and spreads itself to other computers. Viruses are hidden within the code of a host program. Any computing device can be infected with a virus. Boot-sector viruses: replicate themselves in the boot sector of the hard drive. Logic bombs: activate when certain conditions are met. Time bombs: triggered by the passage of time or on a certain date. Script viruses: hidden on web pages as mini-programs. E-mail viruses: use email address books to distribute themselves. Encryption viruses: compress files using a complex encryption key. Viruses copy themselves and infect a file on your computer. Polymorphic viruses: periodically rewrite themselves to avoid detection. Stealth viruses: erase their code from the hard drive and reside in the active memory.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents