1.4 Threats from Human Actions
Loading
All Modules View all topics Close topics
Computer Security and Privacy
Previous Topic Previous slide Next slide Next Topic

1.4 Threats from Human Actions

  • Study Reminders

    Set your study reminders

    We'll email you at these times to remind you to study

    You can set up to 7 reminders per week

    You're all set

    We'll email you at these times to remind you to study

    Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +
  • Study Notes
  • Discuss This Topic
    WAI P.
    TH
    WAI P.

    Viruses, Worms, and Trojan horses Viruses are computer programs that can damage the data or software on your computer or steal the information stored on your computer. These viruses can reach your computer, without your knowledge, through the Internet or through storage devices, such as floppy disks and CD-ROMs. Worms are viruses that replicate themselves once they attack a computer, making it difficult to remove them. A Trojan horse is also a kind of virus disguised as useful software, such as a game or a utility. Once a Trojan horse reaches your computer, it starts acting like a virus causing damage to the computer's data.

  • Text Version
Notification

You have received a new notification

Click here to view them all