Professional Documents
Culture Documents
1
Logic bomb Virus: also called a time bomb virus, which typically does not act
immediately, but rather sits quietly dormant, waiting for a specific event or set of
conditions to occur.
Logic time bomb virus: is a virus that works like a time bomb, waiting to explode
at a specific time.
Power spike: sudden rise or fall in the power.
Surge protector: Can guard against power spikes and can also serve as an
extension cord and splitter.
Uninterruptible power supply UBS: provide battery backup, and provide spike-
free power and keeps computer running during a black out.
Crack: is a method of circumventing a security scheme that prevents a user from
copying a program.
Physical security has two major components 1- the location of device 2- the use of
locking equipment.
Firewalls: developed originally to prevent security breaches such a spoofing and
hacking.
Firewalls run on computers that are attached directly to the internet.
Network sniffer: is a software package that displays network traffic data.
Antivirus Software: Antivirus software should be part of every computer system.
This software is quite successful in detecting and cleaning off known viruses.
Data Backups:
- Organizations can choose from many backup schemes.
- Organizations normally keep more than one backup of important databases and
usually update them on a daily or weekly basis.
- A variation of the backup strategy is to create a rotating backup of perhaps
seven copies of company data, one for each day of the week.