Java Games: Flashcards, matching, concentration, and word search.

Internet Security Part 2(IBF)

Correct match each term with the cooresponding description.

AB
MalwareA malicous software, refers to prohram files whose specifif intent is to harm computer systems.
VirusA malicous program designed to damage computer systems, from stand alone compters to entire networks. It assumes control of systems operations, and damages or destroys data.
Boot Sector VirusMoves boot sector data to another part of the disk and replaces it with its own code. Whenevr the computer starts up, the virus executes.
BombResides on the hard disk and is activated when a particular event occurs, such as a date change, a file change or a user or program action.
Cluster VirusMakes changes to a disk file system. Any programrun from an infected disk causes the virus to run, giving the impression that the virus infects all programs on the disk.
File Infecting VirusInfects program files on a disk. When the infected program is run, the virus also runs.
Macro/ Script VirusInfects a specific type of document file that can include macros, such as Microsoft Word or Excel Files. When the document containing a macro is opened, the virus runs.
CompanionA virus that appears to have the same name as a legitimate application, but in fact has a different name.
Terminate and Stay Resident (TSR)Virus Executes immediately, then appear to no longer run. However they remain resident in memory where they can spread to other systems, cause damage to files, and open network ports.
Stealth VirusResides in the computers memory and conceals changes it nakes to files,hiding the damage from users and operating systems.
PolymorphicContains programming code enabling it to execute differently each time it is run. Because it appears as a different process each time, this virus avoids being detected by virus scanning software.
RetroSpecifically attacks anti virus software.
WormA self replicating program or algorithm that consumes system and network resources. It automatically speards from one computer to another.
Trojana program that appears to be harmless but actually produces harmful results. Do not replicate themselves or copy themselves to other files and disk.
Illicit Serveran application that installs hidden services on your system. Consist of client and server code.
Anti Virus SoftwareSoftware that scans disks and programs for known viruses and eliminates them.
SpywareA software application that is secretly placed on a users system to gather information and relay it to outside parties, usually for advertising purposes.
UpdateA file or collection of tools that resolves systems liabilities and improves software performance.
PatchProgramming Code that provides a temporary solution to a known problem, or bug.
typosquattingAn unethical practice in which the perpetrator capitalizes on typing mistakes that users make when entering a URL of a web site into a browser in an attempt to profit from a trademark belonging to another business by taking adavntage of users typographical errors.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities