Internet Chapter 9
- Starting a Web browser never requires you to enter a user name and password.
- When you access an infected file, you deploy the virus, which might attach itself to other files on your hard drive without your knowledge.
- All viruses are Trojan horses because they hide within legitimate programs.
- Unencrypted information is called plain text.
- Encrypted information is called cipher text.
- Most systems store passwords in a special, encrypted form in order to make them unreadable to hackers.
- A Trojan horse is a (usually small) program hidden inside another program.
- A hacker might use Trojan horses, viruses, or worms to attack computers and the programs they run.
- A Trojan horse claims to be a legitimate program that accomplishes some task when, in fact, it does harm.
- An organization named CERT has teams around the world to recognize and respond to computer attacks.