CS 110 Lecture 10: Personal Computing Lecture 10

26 views6 pages
29 Nov 2016
School
Course

Document Summary

Protection of information and property from theft, corruption, or natural disaster. Allowing the information and property to remain accessible and productive to its intended users. The desire of personal privacy concerning the storing, repurposing, providing to. More chances for error: entering the wrong password. Differing rules: one site wants letters and numbers, others a special character. The more activities your computer is doing to check things. Software is considered malware based on the intent of the programmer. Sometimes, you just can"t do what you"re entitled to do. Security servers are often different than content servers. Virus network file system or a file system that is accessed by another computer. Worm without any human action what allows it to travel unaided. Do damage once installed or run on your computer. At first glance, it appears to be useful software. Unlike viruses and worms, trojans do not reproduce by infecting other files nor do they.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents