These are computer Internet security threats that can crash your system, corrupt your files, or steal your personal information. Computer Internet security threats can cost you thousands if you do not protect yourself.Here is a glossary of computer Internet security terms:
Adware - Adware decreases computer Internet security by collecting information about a user's web surfing patterns in order to display pop-up advertisements.
Hacker - Hackers are individuals who break into computer systems and compromise computer Internet security by stealing or corrupting data.
Key logger - Key loggers may come in the form of spyware or viruses. A file is created of each key typed and then sent out over the Internet. Computer Internet security is at risk as this file may contain credit card numbers, online banking information, passwords, confidential e-mails, and anything else typed on the keyboard.
Phishing - Phishing is a form of spam where a bogus e-mail is sent out mimicking legitimate online businesses. The email directs users to a false web site asking for account information such as credit card numbers. When a user enters this information, computer Internet security is lost and identity theft occurs.
Spam – Spam is electronic junk mail sent over the Internet. In addition to wasting time and bandwidth, spam threatens computer Internet security with all types of e-mail scams. It is a good computer Internet security practice to never give out personal information in response to spam.
Spyware – Spyware is a form of software that installs and runs without the user's knowledge. Spyware is one of today's biggest computer Internet security threats. Often spyware will monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, read cookies, change the default homepage, install other spyware programs, and send all retrieved information back to the spyware author. With this stolen information a thief can easily compromise a user's computer Internet security.
Trojan Horse – Named after the wooden horse used by the Greeks to conquer the city of Troy, a Trojan horse is a malicious program that pretends to be harmless. Computer Internet security is then compromised as the Trojan horse corrupts and destroys files.
Virus – Viruses are programs written to intentionally infect a computer without the user's permission or knowledge. A virus attaches to files or boot sectors, replicates itself, and destroys computer Internet security by corrupting files, draining system resources, and transmitting itself to other computers.
Worm – Worms are similar to viruses and destroy computer Internet security by multiplying, damaging files, and spreading over computer networks. One main difference is that worms can automatically transfer themselves to other machines. Often infected machines are used as zombie computers to send out spam and other computer Internet security threats.
0 comments:
Post a Comment