IT101 Chapter Notes - Chapter 5: Script Kiddie, Industrial Espionage, Rootkit

177 views8 pages

Document Summary

Module 5: digital security, ethics, and privacy: threats, A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other internet services. Ransomware a program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money. A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device. A progra(cid:373) pla(cid:272)ed o(cid:374) a (cid:272)o(cid:373)puter or (cid:373)o(cid:271)ile de(cid:448)i(cid:272)e (cid:449)ithout the user"s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online. Trojan horse a program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents