Sei sulla pagina 1di 2

INVESTIGATION

1. What is a computer hacker?


- A hacker is a person skilled in some branch of technology, often computer, that
is engaged in intervening and / or perform technical alterations with good or bad
intentions on a product or device.

2. What kind of computer viruses exist?


- Types of computer viruses. - Malicious applications can be classified according
to the function they perform or according to the way they are run on the
computer. Here are the different types of viruses that exist:
Boot viruses. These programs affect the boot sector of the computer and the
start-up of the operating system. Therefore, the threat is activated when the
computer is turned on.
Logical or time bombs. They are those viruses that are triggered when a
specific event occurs, such as the arrival of a specific date (time) or the
combination of specific keys by the user without the user knowing (logic).
Link virus. The function of these programs is to modify the access addresses to
the files and, consequently, to prevent the location of stored files.
Overwriting viruses. These malicious programs overwrite the contents of
some files, causing the loss of the original information.
Worms. The main characteristic of these is their ability to replicate, rather than
infection of the system. By staying in the memory of the computer, and because
of their multiplication, they consume a lot of storage capacity of the device.
Trojans. When this type of malware is executed, a third person can enter the
infected computer and, through that remote access, control the system or steal
passwords and data.
Hijackers. The purpose of these programs is the sequestration of Internet
browsers and, consequently, the modification of the main page or the
introduction of advertising in pop-up windows; Even to prevent access to some
websites.
Keylogger. It is an application that registers, with ignorance of the user, the
keystrokes that it performs on the keyboard, and it is a very used tool for
stealing personal passwords.
Hoax. They are programs that display messages with false content, but
presented in an attractive way, to encourage their sending by the users. The
goal is none other than the overhead of networks and e-mail.
Joke. As in the previous case, they are not considered viruses either, and their
function is to cause "amusing" annoyances to the navigator, as for example with
the pornographic pages that appear in the websites and they move of a side to
another.
Spyware. They are spyware programs that collect and / or steal information
from a computer owner.
Adware. Applications that are responsible for displaying ads without the
consent of the user.
Phishing. Using e-mail, the developers of these programs seek, using as lure
messages with attractive content, that the user enters in a website confidential
data to unlawfully appropriate them and often steal money.
State zombie. It occurs when a computer is infected and subsequently
controlled by third parties, and not by its original user.

3. What is a computer virus?


- A virus is software that aims to alter the normal functioning of the computer,
without the permission or knowledge of the user. Viruses, usually, replace
executable files with others infected with the code. Viruses can intentionally
destroy data stored on a computer, but there are also other more harmless,
which only cause discomfort.

4. How do viruses escape detection?


- The authors of a computer virus have several strategies to escape from anti-
virus programs and propagate their creations more effectively. The so-called
polymorphic computer viruses make variations in the copies of themselves to
avoid their detection by the programs of tracing.
Stealth viruses are hidden from the operating system when it checks the
location of the computer virus, simulating the results that would provide an
uninfected system.

5. How do they spread?


- There are two major types of contagion. In the first, the user, at any given time,
inadvertently executes or accepts the installation of the virus. In the second, the
malicious program acts replicating through the networks. In this case we are
talking about worms.

6. What is spam?
- It is called spam or junk mail to unsolicited, unwanted or unknown sender
messages that are extremely annoying.
All those who have an email address we receive several advertising messages
that we do not ask about things that do not interest us. Currently, it is estimated
that between 60 and 80% of the mails (several billions of emails per day) that
are sent are unsolicited, that is, spam.

7. What is an internet fraud?


- Cybernetic and computer fraud refers to fraud carried out through the use of a
computer or the Internet. Hacking is a common form of fraud: the offender uses
sophisticated technological tools to remotely access a computer with
confidential information. Another form of fraud involves the interception of an
electronic transmission. This can lead to theft of the password, a credit card
account number or other confidential information about a person's identity.

8. What is cyber bullying?


- Cyber bullying is a form of harassment that is carried out through an Internet
service such as email, chat rooms, discussion groups, online social networks,
instant messaging or web pages. It can also include harassment through mobile
phone technologies such as text messaging. According to some estimates, more
than a third of American teenagers have been victims of cyberbullying.
Here are some examples of cyber bullying behavior:
Malicious jokes and teasing;
Dissemination of online rumors;
sending unwanted messages; and
Defamation.
Cyber bullying can happen to anyone, and the bully can act anonymously.
People can also be harassed online by groups of people, such as schoolmates or
a group of members of an online community.

Potrebbero piacerti anche