1) Vulnerability- It is software that can be directly used by a hacker to gain access to system or network.
2) Denial-of-service (DOS) attack- An attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources.
3) Distributed denial-of-service (DDos) attack- An attack in which the attacker gains administrative access to as many computers on the internet as possible and uses the multiple computers to send a flood of data packets to the target computer.
4) Malware- a generic term for malicious software.
----1) virus- a piece of software code that inserts itself into a host.
2) Worm-a software program that runs independently, consuming the resources of its host in order to maintain itself.
3) Trojan horse-a program that appears to have a useful function but that contains a hidden function that presents a security risk.
- Thursday, 10 April 2008
-Do not open any files attached to an email unless you know what it is, even if it appears to come from a dear friend or someone you know. Some viruses can replicate themselves and spread through email. Better be safe than sorry and confirm that they really sent it.
-Do not open any files attached to an email if the subject line is questionable or unexpected. If the need to do so is there always save the file to your hard drive before doing so.
- Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam, which is unsolicited, intrusive mail that clogs up the network. - Do not download any files from strangers.
- Update your anti-virus software regularly. Over 500 viruses are discovered each month, so you'll want to be protected. These updates should be at the least the products virus signature files. You may also need to update the product's scanning engine as well.