Chapter 5
Types of malware include: viruses, worms, Trojan horse programs, and rootkits.
Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal or financial information.
Any illegal act involving the use of a computer or related devices is referred to as a computer crime.
A cracker is someone who accesses a computer or network illegally with the intent to destroy data or steal information.
My computer is being controlled by another person and I do not know about it. My computer is a zombie.
A firewall is hardware and/or software that protects a network from hackers.
Backups should be made continuously for the best protection of data.