- Virus
- inserts itself into another program to propagate;
- cannot run independently
- Worm
- propagates itself over a network;
- run independently;
- cannot attach to other programs
- Trojan Horse
- appears to be useful but has a hidden, unintended function that presents security risk;
- cannot replicate itself
- Denial-of-Service Attack
- bombards another computer with a flood of information to keep users from accessing the computer/network
- Phishing
- phony e-mails
A place to be reminded of the stress that the CPA exam brings with the goal to conquer it!
Wednesday, November 26, 2014
Threats in a Computerized Environment
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment