Security and Computer Protection

Go back to Tutorial

Certify and Increase Opportunity.
Be
Govt. Certified Real Estate Consultant

Whether you’re using a computer connected to the Internet from home or office, your computer is a target. Hackers are often looking for credit card numbers, bank account information and any other information they can use for their own gain. It’s not just money-related information they’re after; once they invade a computer, intruders can use the hard disk, processor and Internet connection to attack other computers.

Computer Threats and prevention

Viruses

Various types of viruses, their spread and prevention are

  • Virus: a program that replicates and infects another program by inserting or attaching itself; basically “piggybacking” on files already present on your computer. 
  • Trojan horse: a program that does not replicate or copy itself, but causes damage by tricking user into opening an infected file. 
  • Worm: a program that makes copies of itself specifically intended to be distributed to other computers it can reach, such as via e-mail or network connections.

Methods of spread

E-mail attachments

The most common methods of viruses spred are

  • Instant Messenger or Internet Relay Chat (IRC) file transfers and web links 
  • File downloads from hacked or untrustworthy web sites 
  • Using infected floppy disks, CD-ROMs, USB keychain drives, etc. 
  • Insecure computers being hacked and configured to send out viruses

Go back to Tutorial

Internet Tools for Marketing and Communication
Determining Office Technology Requirements

Get industry recognized certification – Contact us

keyboard_arrow_up
Open chat
Need help?
Hello 👋
Can we help you?