Advertisement
Guest User

Unit 1 Computer Threats

a guest
Jun 28th, 2017
160
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.32 KB | None | 0 0
  1. Threats
  2. Opportunist Threat
  3. People who find an unattended computer which has been left logged into a system may view, steal or damage information, programs or even hardware.
  4. Phishing
  5. This is a type of threat which attempts to gain access to passwords, financial details and other such privileged information. Often this is done by email messages pretending to come from trusted websites, instant messaging or social networks. Normally the try to divert you to a website which looks original and which asks for information about you.
  6. Malware
  7. Malware is an umbrella tem used to refer to a variety of forms of hostile or intrusive software, including computer viruses worms’ Trojan horses’ ransomware spyware adware scareware and stuff like that.
  8. Virus
  9. A computer virus is a type of malicious software program that when executed it replicates by reproducing itself or infecting other computers programs by modifying them and then spreading from computer to computer. They are never beneficial usually the will make some changes to the system they infect and even if they do no damage you don’t really want them.
  10. Worm
  11. A computer worm is a standalone malware computer programme that replicates itself in order to spread to other computers. Often it uses a computer network to spread itself relying on security failures on the target computer to access it unlink a computer virus it done not need to attach itself to an existing program.
  12. Trojan horse
  13. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  14. Ransomware
  15. Ransomware is a form of malware in which rogue software code effectively holds a user’s computer hostage until a ransom fee is paid Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities.
  16. Spyware
  17. Spyware is a type of malware that will go onto your computer just to get and record your details for example credit card bank details passwords stuff like that it hides itself in different files so you can’t delete it and the most common type is a key logger it waits till you start to type and when it does it will record what you are doing.
  18.  
  19.  
  20. Adware
  21. Adware is a form of malware what will install a programme to your computer so adds pop up what you can’t click off forcing you to read them.
  22. Scareware
  23. Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. Scareware which generates popups that resemble windows system messages usually purports to be antivirus.
  24.  
  25.  
  26.  
  27. 2 companies that have been hacked
  28. TalkTalk In October 2016 one of UKs biggest mobile phone providers got hacked they stole the details of over 20000 customers, the hackers were quickly identified and dealt with but the company had been left with a bill up to 35 million pounds having had million wiped off its share price and facing law suits from customers and investors.
  29. Carphone Warehouse
  30. Another massive breach in the UK the hackers exposed almost 2.5 million customer details and almost 90000 encrypted credit cards has been taken as well and they hackers were never found.
  31.  
  32. Preventative and corrective
  33. Physical Barriers
  34. These include turning off computers and licking offices when the systems are unattended to prevent damage by people, the environment for example fire, flooding and electrical interference or theft.
  35. Password control of access
  36. Passwords are sequences of characters known only to the computers user which allow access to a computer network of application passwords should always be strong so that it is hard for someone else to guess them or work them out.
  37. Access levels
  38. These can be set up to allow individuals to have access to only specific level of an application and to prevent unauthorized users from accessing particular data.
  39. Anti-Virus software
  40. This is set up to intercept computer viruses before they can become resident on the computer this software can become resident on the computer. The software can isolate the virus remove it and sometimes repair any damage.
  41.  
  42.  
  43. Firewall
  44. This is a piece of software that monitors all data arriving at your computer from the internet and all data leaving your computer form the internet and all data leaving your computer It stop anything that it think is harmful or unwanted files.
  45. Backup and recovery
  46. Making a backup of data is the only way of recovering from a total data disaster. Many individuals and organisations back up data to flash solid.
  47. Encryption
  48. This is used to codify data so that it cannot be read by anyone who does not have the key to the code. An algorithm which is a self-contained step by step set of operations to be performed is sometimes known as a cipher.
  49. Wireless
  50. Used by wireless enabled devices to log into the internet wireless is exactly what it says there are no wires to connect. Not fixed to a stationary computer, can be used wherever there is a wireless hub which is accessible. Need to have access to a wireless hub can be less secure than wired connections, tend to have slower data transmission speeds than wired broadband methods.
  51. Broadband
  52. A wired connect to a broadband supplier normally the connection is via a network card in the computer cable users have an Ethernet connection from their computer to the network. Connections can give better reception and are usually faster than dial up requires a base which is wired in so it is less flexible than wireless.
  53. Dial-up
  54. A wired connection via conventional telephone line which needs a modem to convert singles to and from analogue
  55. TCP
  56. TCP works with IP which defines how computers send packets of data to each other.
  57. IP
  58. Stands for internet protocol IP is actually networking software for you to interact with the internet.
  59. FTP
  60. The File Transfer Protocol is a standard network protocol used to transfer computer files between a client and server on computer network
  61. Sever
  62. A computer or computer program which manages access to a centralized resource or service in a network.
  63.  
  64.  
  65. Client
  66. A desktop computer or workstation that is capable of obtaining information and applications from a server. A program that is capable of obtaining a service provided by another program.
  67. URL
  68. URL stands for uniform resource locator. A URL specifies the addresses of various network resources on the Internet.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement