BTM 200 Study Guide - Final Guide: Phishing, Indie Built, Wi-Fi

58 views6 pages

Document Summary

Module 7: securing your system: protecting your digital data. Ic3: partnership between fbi and nw3c (internet crime complaint center), maawg. Types of cybercrime: fraud-related (non-delivery of ordered items, credit/debit card fraud, advanced fee scams), non-fraud related (computer intrusions, unsolicited email, child pornography) Virus: program that attaches itself to another program & spreads itself to other computers when files are exchanged, hidden within the code of a host program (any computing device can be infected with a virus) Boot-sector viruses: replicate themselves in boot sector of the hard drive (master boot record: program that executes whenever a computer boots up, ensuring the virus will be loaded into memory immediately) Logic bombs: activate when certain conditions are met (ex: opening file/starting program a # of times) Time bombs: triggered by the passage of time/on certain date. Worms: travel between systems through networks connections to spread infection (infects host file, waits for it to be executed in another computer to replicate)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents