Cable Lock, one of the simplest ways to protect your laptop from physical theft, Malware, any program or code designed to do something undesirable on a system or network, Worm, can replicate on its own through networks, Virus, does not self-replicate across networks, Trojan Horse, pretends to do one thing while doing something evil, Keylogger, records user's keystrokes and makes that info available to the programmer, Rootkit, takes advantage of very low-level operating system functions to hide itself, Spyware, can use your computer’s resources to run distributed computing applications, steal passwords, etc, Botnet, network of infected computers under the control of one person or group, Spoofing, process of pretending to be someone or something you are not, Zero-Day Attack, attack on a vulnerability not already known to the software developers, Pop-Ups, surprise browser windows that appear automatically when you visit a website, Brute Force, any attempt to guess the contents of some kind of data field that isn’t obvious, Spam, unsolicited emails from both legitimate businesses and scammers, Drive-By Downloads, undesired file downloads generated by malicious websites and ads.
0%
Securing Computers Review
Share
Share
Share
by
Jzelenkov
CTE
CS
I-edit ang Content
I-Print kini
Embed
Uban pa
Assignments
Leaderboard
Show more
Show less
Kini nga leaderboard naka-pribado. Pag-klik sa
Share
aron himuon kini nga publiko.
Kini nga leaderboard gi-disable sa tag-iya sa resource.
Kini nga leaderboard gi-disable tungod ang imong mga kapilian lahi ra sa tag-iya sa resource.
I-revert ang mga Kapilian
Ang
Match up
usa ka open-ended nga template. Dili kini makamugna ug mga marka sa leaderboard.
Kinahanglan mag log in
Visual style
Fonts
Subscription required
Mga Option
I-switch ang template
Ipakita tanan
Daghang mga format ang mugawas samtang gidula nimo ang activity.
Open results
Copy link
QR code
Mag-delete
I-restore ang gi-autosave:
?