CS 110 Lecture 10: Personal Computing Lecture 10
Document Summary
Protection of information and property from theft, corruption, or natural disaster. Allowing the information and property to remain accessible and productive to its intended users. The desire of personal privacy concerning the storing, repurposing, providing to. More chances for error: entering the wrong password. Differing rules: one site wants letters and numbers, others a special character. The more activities your computer is doing to check things. Software is considered malware based on the intent of the programmer. Sometimes, you just can"t do what you"re entitled to do. Security servers are often different than content servers. Virus network file system or a file system that is accessed by another computer. Worm without any human action what allows it to travel unaided. Do damage once installed or run on your computer. At first glance, it appears to be useful software. Unlike viruses and worms, trojans do not reproduce by infecting other files nor do they.