Paper 1, Attacks & Prevention

  • Malware - aim is to cause harm to the computer. Examples include Trojan horses, viruses and worms. Anti-malware either detects, deletes or quarantines the data so that it cannot have an effect. Yet some people do not keep their anti-malware software up to date making them vulnerable to attack.
  • Phishing - fake websites/emails that appear to be legitimate that get the user to input their details so they can be used.
  • People as the weak point - goodwill taken advantage of. In theory, the more IT literate someone is the better, this may be specifically

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »