MISY160 Chapter Notes - Chapter 9: Grey Hat, Security Token, Antivirus Software

31 views2 pages

Document Summary

Cybercrime: any crime perpetrated through the use of a computer. Common types: fbi-related scams, identity theft, non-delivery of merchandise (nonauction), and advance fee fraud. Virus: computer program that attaches to another computer program to spread when files are exchanged; require interaction to spread and attempt to steal information. Boot-sector virus: replicates onto the master boot record of a hard drive so that the virus will be loaded immediately onto memory before virus protection can load. Master boot record: program that executes whenever the computer boots. Logic bomb: virus triggered by certain conditions (ex. Opening a file or starting a program certain amount of times) Time bomb: virus triggered by passage of time/a certain date. Worm: take advantage of file transport methods to spread on their own. Script: series of commands (miniprogram) that executes without your knowledge; can be helpful or malicious. Macro virus: attaches itself to document that uses macros. Email virus: uses address book to distribute a virus.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents