Flash Card - Overview of futureskills and cyber security

  • Viruses

    Viruses


    A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread does not remain directly under our control.

  • Macro Viruses

    Macro Viruses


    A simple macro is series of programming steps that are stored in a single location. Macro allows automation of many actions with only a single keystroke. These can be embedded in the program files. Many programs, such as Word and excel allow you to record a series of keystrokes and menu selections and then save them to a file.

  • Worms

    Worms


    Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves (usually to other computer systems via network connections). Viruses often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.

  • Trojan horses

    Trojan horses


    A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system. Since they look like sincere programs they are referred as Trojan like the Trojan horse of Greek mythology. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer.

  • Spyware

    Spyware


    A Spyware as the name suggest is a program used to spy on the computer system. This program will try to get all the confidential and sensitive information such as your bank account numbers, passwords etc. Then this confidential data is misused to access user’s accounts. Spyware can also change the configuration of your computer, generally without obtaining your consent first.

  • Malware

    Malware


    Malware is short for “malicious software.” Malware is any kind of unwanted software that is installed without your adequate consent. The intent of the malware is to damage the data or functionality of the computer or network. In fact all the threats mentioned above such as virus, Trojans etc are examples of Malware.

  • Spams

    Spams


    The term “spam” refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). It is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. It is also referred as junk email. Unsolicited email mostly contains advertisements for services or products.

  • Hackers and crackers

    Hackers and crackers


    Hackers and crackers are the software programmers who use dubious ways to get control over your computer and systems. The intent of both hackers and crackers is to gain control over your computer so that they can get the sensitive confidential information. They then use this information against you by stealing money, personal data, pictures, bank details and government military information, so on and so forth.

  • Anti Virus

    Anti Virus


    Anti Virus tools are the software programs that help us detect the virus in emails or files and hence protect our computers. These tools can detect virus, worms, Trojans as well as spyware and adware. They block us from visiting unsafe websites, and also downloading unsafe programs from such websites. They protect us from identity thefts and threats from phishing websites.

  • VOIP

    VOIP


    Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Early providers of voice over IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network.