1,195
22
Essay, 2 pages (500 words)

Gcf learning & computer security and internet safety

pharminga technique used to redirect a legitimate websites traffic to another illegitimate website in order to gain access to a user’s personal informationvirusa self-replicating program that is designed to infect a computer by rapidly spreading from one file to another, sometimes causing great harm ONGCF LEARNING & COMPUTER SECURITY AND INTERNET SAFETY SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Nowphishingmail or instant message scams that are disguised to look like official communications from a legitimate websitetrojan horsea type of malware that appears to be benign or desirable and thus tricks the user into allowing the program access to their computer, usually through a download or email attachmentmalwareintentionally malicious software or code that is designed to damage your computer or collect information without your knowledgespywarea type of malware that collects information about users without their knowledge, often to track browsing habits and to create pop-up advertisementsspamunsolicited email or junk mailbrowse hijackingoccurs when malware or spyware replaces your browser’s home page with its own in order to force more hits to a particular websiteclickjackinga technique that tricks users into clicking on a malicious link by adding the link to a transparent layer over what appears to be a legitimate web pagehoaxan email chain letter that warns of impending viruses and ties to scare users into forwarding and continuing the hoax emailmousetrappingkeeps visitors from leaving a website by locking them into a window, opening multiple windows on the desktop, or relaunching their website in a window that can’t be closedsockpuppeta fake identity that someone creates and uses to deceive others for some kind of personal gainavatara virtual representation of yourselfdoocedsomeone losing their job because of something they posted on a blog or social networking sitetrolla person who posts comments just to get a rise out of people and cause a distractionflame wara heated argument in a social media outlet such as a web forum, mailing list or chat room, in which intentionally insulting comments and personal attacks become a focus of conversationscreen name(username) a virtual name that is used to identify users of a website where social media is a component (real name or pseudonym)flame baita comment posted by someone trying to provoke a flame: an angry responsememesomething that has gone viral, or spread rapidly around the internet, such as a catchphrase, hoax, topic, concept or piece of mediapostscontent that people publish on websites involving social media, such as blogs, newsgroups, and forumschatslive, online conversationscomputer privacykeeping your personal files and data secret and secure from unauthorized viewing or tamperingcomputer securitythe measures you can take to avoid threats and damage to your computer from physical harm or tamperinghackera person who intentionally gains access to your computer when you connect it to the Internet with the intent of doing harm to the system or using the system in an unauthorized mannersoftware piracytheft of a computer design or program by downloading or copying without permissionantivirus softwarespecifically protects against virusesanti-spyware softwareprotects against malicious software that may be gathering your information without your knowledgefirewallscreens out threats that try to reach your computer over the Internet

Thank's for Your Vote!
Gcf learning & computer security and internet safety. Page 1
Gcf learning & computer security and internet safety. Page 2
Gcf learning & computer security and internet safety. Page 3

This work, titled "Gcf learning & computer security and internet safety" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Gcf learning & computer security and internet safety'. 1 January.

Reference

AssignBuster. (2022, January 1). Gcf learning & computer security and internet safety. Retrieved from https://assignbuster.com/gcf-learning-computer-security-and-internet-safety/

References

AssignBuster. 2022. "Gcf learning & computer security and internet safety." January 1, 2022. https://assignbuster.com/gcf-learning-computer-security-and-internet-safety/.

1. AssignBuster. "Gcf learning & computer security and internet safety." January 1, 2022. https://assignbuster.com/gcf-learning-computer-security-and-internet-safety/.


Bibliography


AssignBuster. "Gcf learning & computer security and internet safety." January 1, 2022. https://assignbuster.com/gcf-learning-computer-security-and-internet-safety/.

Work Cited

"Gcf learning & computer security and internet safety." AssignBuster, 1 Jan. 2022, assignbuster.com/gcf-learning-computer-security-and-internet-safety/.

Get in Touch

Please, let us know if you have any ideas on improving Gcf learning & computer security and internet safety, or our service. We will be happy to hear what you think: [email protected]