Information Technology Reference
In-Depth Information
________The act of attempting to identify a user's password in order to gain access to a sys-
tem or program.
________A piece of malicious software that looks harmless but has a detrimental effect on a
computer when it runs.
________Malicious software that copies itself (replicates) to other programs on the same
computer to “infect” them.
Sum It Up
List four types of activities that computer criminals engage in.
Why is it important to have an active firewall either on your computer or at the edge of your
network (or both)?
How many different types of threats can be detected by security solution software products?
Why do you need to be careful when using Wi-Fi in public places?
What are the effects of a denial of service attack?
Explore More
Backing Up Your Data
Have a look at the files on your computer and make a list of those that contain personal data.
Compare the different methods and devices you could use to make a copy of this data and identify
the best way of making a backup copy. If you have the means, make a backup copy and identify a
safe place to keep it.
Keeping Your System Up to Date
Explore your computer to check how up-to-date it is. Does it have a service pack installed? Run
the Windows Update process to see if there are any uninstalled updates. Is there a reason why you
have not installed them?
Protecting Yourself against Malware
Identify what type of anti-virus solution you have in place. Every package has its own control
panel for administration. Open this panel and see how often the software checks the Internet for
updates. Carry out a manual scan of your computer.
What Are the Latest Threats?
Visit the website of one of the anti-virus software providers and look at what the latest threats are
and how recent they are. Identify how many pieces of malware have been discovered in the last
seven days.
Think It Over
Planning for Security
Imagine that you are going to purchase a new computer running a Windows operating system.
Thinking of security, what steps would you take to ensure that the computer is secure from
unauthorized users and that your data is protected against loss or damage? Think of any software
programs you may install to provide additional protection and compare the features of the differ-
ent products to identify which would be best for your situation.
Search WWH ::




Custom Search