Paper 1, Attacks & Prevention
- Created by: AmyBirch01
- Created on: 13-05-18 19:45
Fullscreen
- Malware - aim is to cause harm to the computer. Examples include Trojan horses, viruses and worms. Anti-malware either detects, deletes or quarantines the data so that it cannot have an effect. Yet some people do not keep their anti-malware software up to date making them vulnerable to attack.
- Phishing - fake websites/emails that appear to be legitimate that get the user to input their details so they can be used.
- People as the weak point - goodwill taken advantage of. In theory, the more IT literate someone is the better, this may be specifically…
Comments
No comments have yet been made