Wednesday, November 26, 2014

Threats in a Computerized Environment

  • Virus  
    • inserts itself into another program to propagate; 
    • cannot run independently
  • Worm 
    • propagates itself over a network; 
    • run independently; 
    • cannot attach to other programs
  • Trojan Horse 
    • appears to be useful but has a hidden, unintended function that presents security risk; 
    • cannot replicate itself
  • Denial-of-Service Attack 
    • bombards another computer with a flood of information to keep users from accessing the computer/network
  • Phishing
    • phony e-mails 

No comments:

Post a Comment