You are on page 1of 2

Rawafed Private

Term 2 Summary Sheet


Subject: Computer Date: ____/02/2017
Name: ______________________ Grade: 9_______

Chapter 8- security issues and strategies

Pages: 370- 378


Hackers and crackers have developed a variety of viruses.
The signs of the virus infection are:
1- Some of your files become corrupted and suddenly dont work properly.
2- Programs or files have suddenly vanished.
3- Strange messages or images display on your monitor.
4- A disk or volume name has been changed.
5- Unexpected sounds or music are played at random times.
Nuisance virus: usually does no real damage, but is rather just an inconvenience.
Espionage Viruses designed to create a backdoor into a system to bypass security.
Espionage viruses: does not inflict immediate damage, but it allows a hacker or
cracker to enter the system later for purpose of stealing data or spying on the work
of a competitor.
Keystroke logger also called a key logger.
Keystroke logger: stores every typed keystroke on the hard drive. Later, a hacker
can access this file and analyze it. (looking for credit card numbers and passwords)
Data- destructive virus is designed to destroy this data. Erasing or corrupting files
so that they are unreadable is a common trick.
Some of data distractive viruses go for the easy route and simply attempt to format
the entire drive, leave it blank.
The methods of operating and transmission way to classify viruses:
1- Varient viruses.
2- Boot sector viruses.
3- Logic (time) bomb viruses.
Variant Viruses: programed to change themselves and their behavior to fool
programs meant to stop them.
Vaiant viruses come in many different flavors or change their behavior from one day
to tge next day to avoid detection.
The Boot sector of a hard disk contains a variety of information, including how the
disk is organized and whether it is capable loading an operating system.
Boot sector virus is designed to alter the boot sector of a disk, so that whenever
the operating system reads the boot sector, the computer will automatically become
infected.
Trojan horse virus: hides inside another legitimate program or data file. These
viruses are quite common with downloaded games and other types of shareware files
such as screen savers.
The download file may install and run without a problem but, unknown to the victim,
a virus is included in the software, installing itself with other files. These viruses may
cause damage immediately, or they may delay acting for a time (Trojan horse virus).

1
Logic bomb Virus: also called a time bomb virus, which typically does not act
immediately, but rather sits quietly dormant, waiting for a specific event or set of
conditions to occur.
Logic time bomb virus: is a virus that works like a time bomb, waiting to explode
at a specific time.
Power spike: sudden rise or fall in the power.
Surge protector: Can guard against power spikes and can also serve as an
extension cord and splitter.
Uninterruptible power supply UBS: provide battery backup, and provide spike-
free power and keeps computer running during a black out.
Crack: is a method of circumventing a security scheme that prevents a user from
copying a program.
Physical security has two major components 1- the location of device 2- the use of
locking equipment.
Firewalls: developed originally to prevent security breaches such a spoofing and
hacking.
Firewalls run on computers that are attached directly to the internet.
Network sniffer: is a software package that displays network traffic data.
Antivirus Software: Antivirus software should be part of every computer system.
This software is quite successful in detecting and cleaning off known viruses.
Data Backups:
- Organizations can choose from many backup schemes.
- Organizations normally keep more than one backup of important databases and
usually update them on a daily or weekly basis.
- A variation of the backup strategy is to create a rotating backup of perhaps
seven copies of company data, one for each day of the week.

You might also like