Page 129 - digitalliteracy
P. 129

6.2  Remaining Safe and Secure Online




                       Having a virus on your computer is not an acceptable excuse for turning your assignments in
                       late. So make sure you install a strong antivirus software program to protect your computer if
                       you accidentally open a file that contains a virus.



                       Trojan Horse

                       A Trojan horse is a type of malware that disguises itself as one type of program but is actually
                       a different type of program. For example, the software may claim to be a game, but when you
                       install it on your computer it does damage, such as erasing your hard drive. Trojan horses can
                       infect other files throughout your computer and even send important information over the
                       Internet and allow the creator of the Trojan horse to control your computer, slow its activity,
                       or crash the machine.

                       Unlike a virus, a Trojan horse does not reproduce itself on its own. The creator of the Trojan
                       horse must convince you to download and consciously or unconsciously install the program.
                       This is usually done when you open an e-mail attachment that contains the malware or down-
                       load a file that is unsafe. A good malware software security program installed on your com-
                       puter will protect against most Trojan horses. However, remember to open e-mails or e-mail
                       attachments and download files only from trusted sources.



                       Computer Worm

                       A computer worm is another type of
                       malware that scans your computer for
                       security holes. These security holes can
                       be created when a new threat appears
                       and you have not updated your secu-
                       rity software. The worm enters  the
                       computer through one of these holes
                       and  reproduces itself,  infecting  other
                       programs on your computer. A worm
                       has the ability  to copy itself from
                       machine to machine. It  uses up  com-
                       puter processing time and often carries
                       payloads of other malware that  dam-
                       age your computer or your files. It can                          Stuart Jenner/iStock/Thinkstock
                       go throughout a computer network,  Computer worms are another type of threat to your
                       including the Internet, and infect hun-  computer. What is at least one step you can take to
                       dreds of thousands of computers.       avoid getting a computer worm?

                       In 2001 a worm called Code Red was predicted to do so much damage that it was feared the
                       Internet would grind to a halt (Brain & Fenlon, 2015). Luckily, this did not occur, but imagine
                       if a worm attacked a cell phone network today. The danger of this is real, and you should be
                       sure to protect all your electronic devices, including your cell phone, from malicious attacks.
                       Discuss security software options with your Internet service provider or cell phone provider.









                                                                 113
                        © 2016 Bridgepoint Education, Inc. All rights reserved. Not for resale or redistribution.



       sol82612_06_m06_097-120.indd   113                                                                            6/29/16   5:14 PM
   124   125   126   127   128   129   130   131   132   133   134