Académique Documents
Professionnel Documents
Culture Documents
in Action
Alan Evans Kendall Martin
Mary Anne Poatsy
Twelfth Edition
Technology in Action
Chapter 9
Securing Your System:
Protecting Your Digital Data and Devices
9-3
9-4
9-5
9-6
9-7
Computer Viruses
Major Categories of Viruses
9-8
Popular programs
Symantec
Kaspersky
AVG
McAfee
9-9
Understanding Hackers
Types of hackers
White-hat or ethical
hackers
Black-hat hackers
Grey-hat hackers
9-10
Understanding Hackers
Trojan Horses and Rootkits
9-11
Understanding Hackers
Denial-of-Service Attacks
Legitimate users
are denied
access to a
computer
system
System shuts
down
9-12
9-13
9-14
Fingerprint
Iris pattern in eye
Voice authentication
Face pattern recognition
Provide high level of
security
9-15
9-16
9-17
9-18
9-19
Windows Defender
Installs one or two additional
standalone anti-spyware
programs
9-20
9-21
Backups
Copies of data used to
replace originals
9-22
Social Engineering
Phishing and Pharming
Phishing
Luring people into revealing
information
Pharming
Malicious code planted on
your computer to gather
information
Guidelines to avoid
schemes
Copyright 2016 Pearson Education, Inc.
9-23
Social Engineering
Scareware
Type of malware
Attempts to
convince you
something is
wrong and to
pay money to fix
it
9-24
Surge protector
Replace every 23 years
Use with all devices that have solid-state
components
Copyright 2016 Pearson Education, Inc.
9-25
9-26
9-27
9-28