Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Zombie

Pharming

Botnet

Spam

Worm

Phishing

Intellectual Property Rights

A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner.

similar in nature to email phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing.

Spam is usually considered to be electronic junk mail or junk newsgroup postings.

A botnet refers to a type of bot running on an IRC network that has been created with a trojan.

The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.

any property that is created using original thought. Traditional intellectual property rights include patents, copyrights and trademarks. Unlike tangible property, rights are not extinguished when the property is destroyed.

Copyright

The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work. Abbreviated as (c) or ©

Firewall

Trojan horse

Digital signature

Audit trail

Green computing

Surge protector

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.

Quarantine

A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender.

A destructive program that masquerades as a benign application.

Describes the study and use of computer resources in an efficient way.

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.

A device that shields computer and other electronic devices from surges in electrical power, or transient voltage, that flow from the power supply.

To move an infected file, such as a virus, into an area where it cannot cause more harm. Antivirus softwares come with quarantine options so that the user also can keep track of virus activity

Learn more about creating dynamic, engaging presentations with Prezi