These programs conceal
themselves on your PC. They
monitor what you do, or look
throughtheinformationthat
is stored on your PC,and
sendthe informationbackto
their creators.
Spyware
These risks consist of flaws
in legitimate software that
can be exploited, either to
causedamage,blockdata,or
steal information.
Vulnerabilities are usually
exploited through network
connections.
Vulnerabilities
Types of threats
Threats consist of the software that has been
deliberately designed to destroy, modify, disclose, or
block your data.
Threats fall into the following categories:
Viruses are the small
programs that attach
themselvestootherprograms
and replicate themselves.
Viruses
Wormsarelikevirusesinthat
they copy themselves from
PC to PC, but theydo not
attach themselves to other
programs.
Worms
Understanding alerts andmessages
Types of threats
222