1,624
26
Essay, 2 pages (250 words)

Discovering computers, chapter 5

SmartScreen FilterA way to adjust security settings offered by Internet ExplorerphishingA type of fraudulent e-mail that typically contains misspellings and dire warningsauthenticationThe process used to verify or identify computer usersbiometricsUsing physical features such as fingerprints, facial recognition, and retinal scans to verify a person’s identitysmishingUsing text messages to get you to download a mobile app that steals your informationwormType of malware that spreads without human interaction, sending itself out to everyone in your address bookvirusType of malware that is spread when you distribute infected files, especially as e-mail attachmentsspywareType of malware that collects bits of data, like your surfing habitspiggybackingA slowed down Wi-Fi connection can be the result of thisWhite HatType of hacker that wants to show off their skills and doesn’t intend any serious damagehurricanes and stormsEvents that account for almost half of total catastrophic data lossesuninterruptibleType of power supply/battery backup device that can prevent some form of data lossBlack HatType of hacker who intends serious harm through espionage, theft, or disruption of a networkcyberterrorismUsing automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most peopleComponents of an online profileDetails about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online couponsNetiquetteA set of online communication practices and rulesIdentity theftThe nation’s fastest growing crime, where victims are unaware it’s being committed until the damage is doneDriver’s license, birth certificateItems an identity thief can obtain to impersonate youmalwareCommon forms include computer viruses, Trojan horses, and wormsadwareDisplays unwanted advertisements in banners or pop-up windows on your computerbotComputer taken over by hackers to perform malicious tasks across a network ONDISCOVERING COMPUTERS, CHAPTER 5 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Discovering computers, chapter 5. Page 1
Discovering computers, chapter 5. Page 2
Discovering computers, chapter 5. Page 3

This work, titled "Discovering computers, chapter 5" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Discovering computers, chapter 5'. 24 September.

Reference

AssignBuster. (2022, September 24). Discovering computers, chapter 5. Retrieved from https://assignbuster.com/discovering-computers-chapter-5/

References

AssignBuster. 2022. "Discovering computers, chapter 5." September 24, 2022. https://assignbuster.com/discovering-computers-chapter-5/.

1. AssignBuster. "Discovering computers, chapter 5." September 24, 2022. https://assignbuster.com/discovering-computers-chapter-5/.


Bibliography


AssignBuster. "Discovering computers, chapter 5." September 24, 2022. https://assignbuster.com/discovering-computers-chapter-5/.

Work Cited

"Discovering computers, chapter 5." AssignBuster, 24 Sept. 2022, assignbuster.com/discovering-computers-chapter-5/.

Get in Touch

Please, let us know if you have any ideas on improving Discovering computers, chapter 5, or our service. We will be happy to hear what you think: [email protected]