IT101 Chapter Notes - Chapter 5: Script Kiddie, Industrial Espionage, Rootkit
Document Summary
Module 5: digital security, ethics, and privacy: threats, A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other internet services. Ransomware a program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money. A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device. A progra(cid:373) pla(cid:272)ed o(cid:374) a (cid:272)o(cid:373)puter or (cid:373)o(cid:271)ile de(cid:448)i(cid:272)e (cid:449)ithout the user"s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online. Trojan horse a program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.