Module 5.3 Flashcards
(28 cards)
what is a virus
software written to disrupt the normal functioning of a computer and is loaded without the knowledge/consent of owner
3 ways viruses spread
- infected attachments sent email
- infected files downloaded from internet
- infected files stored portable media (flash drive)
(most often spread when open infected file)
7 signs you have a virus
- files randomly disappear
- computer slows down dramatically
- programs stop working properly
- free space suddenly reduced
- error messages start appearing
- computer no longer boots up
- anti-virus software reports threat/presence virus
what is anti-virus software
computer program scans computer files for presence of virus and eliminates them. detects virus canning computer file and comparing it to its database of virus definitions
what is a virus signature/definition
pattern that uniquely identifies virus, need to be updated often and can be downloaded from internet for anti-virus software you have installed
what does an antivirus program do
- warn you of a virus’ presence or any suspicious activity
- automatically deletes a virus it detects
- quarantine virus (placed area where it cannot infect the computer)
examples of antivirus
Norton’s Antivirus, AVG, Avast, Bit Defender, Kaspersky, McAfee
how to prevent viruses
- have antivirus software
- keep virus definitions updated
- set antivirus software update automatically
- scan files portable media before use
- scan email attachments before opening
- set antivirus scan incoming/outgoing emails
- not opening emails/running programs from people dont know
- avoid pirated siftware
- disable autorun feature flash drives
what is a computer worm
malware able distribute itself over a network (normally via email) without a person having to run an infected program. Able reproduce itself many times, computer send out many worms
effects of computer worms
- take up free space
- slow your computer down
how to prevent computer worms
have updated ant virus software
what is a trojan
destructive program disguised as a useful application, often as exe file
what do trojans do
delete files on your computer or scan computer personal information and send it to the creator
what is spyware
software monitors and tracks way use your computer and sends the information to third parties without knowledge/consent. loaded without knowledge
what is the most dangerous form of spyware and how does it work
keylogging, tracks keystrokes to attempt know username and passwords
6 signs computer infected with spyware
- reported antispyware software
- internet activity initiated by user
- changes made to internet settings (eg. homepage) but not by user
- computer slows down dramatically
- user redirected different pages when trying go specific web page
- many pop-up windows appear, often advertising/installation requests
3 ways prevent spyware
- install antispyware (often part antivirus)
- keep antispyware up to date
- ignore pop-up windows
what is adware
software downloads and bombards you with adverts that pop-up whenever you are connected to the internet
what is spam
email sent you in form of advertising products that you did not request (electronic junkmail)
5 ways prevent spam
- check if your ISP can block spam
- be careful who you give your email to, some websites may ‘sell’ it
- never respond to spam
- install antispam (often included antivirus)
- filter out spam through your email program and send straight to junk mail
what is an internet hoax
email message or article intended to deceive or defraud other
how to prevent scams/hoaxes
- dont accept information at face value
- check source and determine if it is reliable
- legitimised by a ‘friend of a friend’ not reliable
- delete messages you recognise as a hoax
- aware of virus hoaxes encourage you delete files may be crucial for the running of your computer
what is phishing
attempts from people to con user into giving out personal and confidential information by posing as a legitimate organisation
prevention tips for phishing
- dont respond requests via email, from any source to confirm details
- type URLs of bank websites directly (dont click on email link)
- check site is secure