icf

Cards (62)

  • Rootkit
    A program that hides in a computer and allows someone from a remote location to take full control of the computer
  • How a computer virus attacks
    1. Virus attaches to a program, file, or document
    2. Virus lies dormant until circumstances cause the computer or device to execute its code
    3. Virus code is executed when infected program is run
    4. Virus can infect other computers on the same network
  • Things a virus can do
    • Steal passwords or data
    • Log keystrokes
    • Corrupt files
    • Spam your email contacts
    • Take over your machine
  • Some viruses can be playful in intent and effect
  • Some viruses can have profound and damaging effects, including erasing data or causing permanent damage to your hard disk
  • Some viruses are designed with financial gains in mind
  • Computer virus
    A type of malicious code or program designed to spread from one computer to another and alter the way a computer operates
  • Computer virus
    • It is designed to spread from host to host and has the ability to replicate itself
    • It cannot reproduce without a host cell, just like flu viruses
    • It operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code
    • It has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data
  • Worm
    A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network
  • Trojan horse
    A program that hides within or looks like a legitimate program, and is usually triggered by a certain condition or action
  • How do computer viruses spread?
    1. Through email and text message attachments
    2. Internet file downloads
    3. Social media scam links
    4. Shady app downloads
    5. Disguised as attachments of socially shareable content
  • In a constantly connected world, you can contract a computer virus in many ways, some more obvious than others
  • To help stay safe
  • Step 3a
    Some users open the attachment and their computers become infected with the virus
  • Step 3b
    1. Other users do not recognize the name of the sender of the email message
    2. These users do not open the email message
    3. Instead they immediately delete the email message and continue using their computers
    4. These users' computers are not infected with the virus
  • 11 Ways Computer Viruses Are Spread
    • Email attachments
    • Rogue Websites
    • Networks
    • Infected Boot disks
    • Phishing Schemes
    • Infected Software
    • Hackers
    • Instant Messaging
    • Fake Anti Virus Software
    • From Mobile Devices
    • Friends and Relatives
  • Signs of a computer virus
    • Frequent pop-up windows
    • Changes to your homepage
    • Mass emails being sent from your email account
    • Frequent crashes
    • Unusually slow computer performance
    • Unknown programs that start up when you turn on your computer
    • Unusual activities like password changes
  • 8 Tips to Protect Your Computer from Viruses and Malware
    • Keep your software up to date
    • Don't click on links within emails
    • Use free antivirus software
    • Back up your computer
    • Use a strong password
    • Use a firewall
    • Minimize downloads
    • Use a pop-up blocker
  • Even the most vigilant of computer users still run the risk of picking up malware
  • You should suspect a computer virus if your machine slows down, crashes, or repeats error messages
  • Strong password
    A password that is complex, with a mix of letters, numbers, and symbols
  • Instructions on how to create a strong password
    • Never use personal information
    • Include a combination of letters, numbers, and symbols
    • Prioritize password length
    • Never repeat passwords
    • Avoid using real words
  • Password security
    With 68 percent of people reusing the same security password for different accounts, it's needless to note that the majority of people need to re
  • Secure passwords
    Include a variety of random characters, numbers, and letters to make the password more complex
  • Safe passwords
    • Should be at least 16 characters long to lessen the chances of falling victim to a data breach or cyberattack
  • Reusing the same password for different accounts puts you at risk of credential stuffing attacks frequently used by cybercriminals
  • Hackers use malicious programs that can process every word found in a dictionary to crack passwords
  • 68 percent of people reuse the same security password for different accounts
  • Without having password security best practices top of mind

    Individuals and businesses alike could be leaving themselves open to cybersecurity threats
  • Password spraying
    A hacking technique that cybercriminals use to guess the passwords of their potential victims
  • The method uses an extensive list of frequently chosen passwords to test against an individual's username
  • If there is a match, the hacker will get access to the account information
  • Keylogging
    Involves the installation of malware that can track a person's keystrokes as they type on their computer
  • Credential stuffing attacks
    Use known passwords to gain access to account information, obtained in a previous data breach
  • Password security tips
    • Don't use personal information
    • Randomize patterns and sequences
    • Never reuse passwords
    • Prioritize password length
    • Never share your password
    • Avoid public Wi-Fi
    • Use a variety of numbers, letters, and characters
    • Download a password manager
    • Check your password strength
    • Change passwords periodically
  • Using names, birthdays, addresses, or phone numbers in your password could jeopardize its effectiveness against cyberattacks
  • Attachment
    A file or piece of data sent along with an email or message
  • Virus
    A type of malicious software (malware) that can harm your computer or steal your personal information
  • Infection
    When a virus enters your computer and starts causing problems
  • Preventing virus infections from attachments
    Do not open attachments from unknown or suspicious sources. Verify with the sender if you are expecting an attachment. Use antivirus software to scan all attachments before opening them. Keep your operating system and other software up to date.