Page 129 - digitalliteracy
P. 129
6.2 Remaining Safe and Secure Online
Having a virus on your computer is not an acceptable excuse for turning your assignments in
late. So make sure you install a strong antivirus software program to protect your computer if
you accidentally open a file that contains a virus.
Trojan Horse
A Trojan horse is a type of malware that disguises itself as one type of program but is actually
a different type of program. For example, the software may claim to be a game, but when you
install it on your computer it does damage, such as erasing your hard drive. Trojan horses can
infect other files throughout your computer and even send important information over the
Internet and allow the creator of the Trojan horse to control your computer, slow its activity,
or crash the machine.
Unlike a virus, a Trojan horse does not reproduce itself on its own. The creator of the Trojan
horse must convince you to download and consciously or unconsciously install the program.
This is usually done when you open an e-mail attachment that contains the malware or down-
load a file that is unsafe. A good malware software security program installed on your com-
puter will protect against most Trojan horses. However, remember to open e-mails or e-mail
attachments and download files only from trusted sources.
Computer Worm
A computer worm is another type of
malware that scans your computer for
security holes. These security holes can
be created when a new threat appears
and you have not updated your secu-
rity software. The worm enters the
computer through one of these holes
and reproduces itself, infecting other
programs on your computer. A worm
has the ability to copy itself from
machine to machine. It uses up com-
puter processing time and often carries
payloads of other malware that dam-
age your computer or your files. It can Stuart Jenner/iStock/Thinkstock
go throughout a computer network, Computer worms are another type of threat to your
including the Internet, and infect hun- computer. What is at least one step you can take to
dreds of thousands of computers. avoid getting a computer worm?
In 2001 a worm called Code Red was predicted to do so much damage that it was feared the
Internet would grind to a halt (Brain & Fenlon, 2015). Luckily, this did not occur, but imagine
if a worm attacked a cell phone network today. The danger of this is real, and you should be
sure to protect all your electronic devices, including your cell phone, from malicious attacks.
Discuss security software options with your Internet service provider or cell phone provider.
113
© 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.
sol82612_06_m06_097-120.indd 113 6/29/16 5:14 PM

