Flash Card - Overview of futureskills and cyber security
A computer virus is a program usually hidden within another simple program. It produces copies of itself and inserts them into other programs or files, in turn destroying the data and performing other malicious actions. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread does not remain directly under our control.
A simple macro is series of programming steps that are stored in a single location. Macro allows automation of many actions with only a single keystroke. These can be embedded in the program files. Many programs, such as Word and excel allow you to record a series of keystrokes and menu selections and then save them to a file.
Worms are very similar to viruses in the manner that they are computer programs that replicate copies of themselves (usually to other computer systems via network connections). Viruses often, but not always, contain some functionality that will interfere with the normal use of a computer or a program.
A Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses into the system. Since they look like sincere programs they are referred as Trojan like the Trojan horse of Greek mythology. The Trojan program does not attach itself to the files like a virus nor replicate itself like a worm but it does provide unauthorized access to user’s computer.
A Spyware as the name suggest is a program used to spy on the computer system. This program will try to get all the confidential and sensitive information such as your bank account numbers, passwords etc. Then this confidential data is misused to access user’s accounts. Spyware can also change the configuration of your computer, generally without obtaining your consent first.
Malware is short for “malicious software.” Malware is any kind of unwanted software that is installed without your adequate consent. The intent of the malware is to damage the data or functionality of the computer or network. In fact all the threats mentioned above such as virus, Trojans etc are examples of Malware.
The term “spam” refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE). It is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. It is also referred as junk email. Unsolicited email mostly contains advertisements for services or products.
Hackers and crackers
Hackers and crackers are the software programmers who use dubious ways to get control over your computer and systems. The intent of both hackers and crackers is to gain control over your computer so that they can get the sensitive confidential information. They then use this information against you by stealing money, personal data, pictures, bank details and government military information, so on and so forth.
Anti Virus tools are the software programs that help us detect the virus in emails or files and hence protect our computers. These tools can detect virus, worms, Trojans as well as spyware and adware. They block us from visiting unsafe websites, and also downloading unsafe programs from such websites. They protect us from identity thefts and threats from phishing websites.
Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Early providers of voice over IP services offered business models and technical solutions that mirrored the architecture of the legacy telephone network.