amyg367
Mind Map by , created over 6 years ago

GCSE GSCE ICT Mind Map on Viruses!, created by amyg367 on 05/07/2013.

27
2
0
Tags
amyg367
Created by amyg367 over 6 years ago
Mobile Phone Features
Lana Mills
Can you fully explain the ethics behind downloading and using software that you haven't paid for?
Lana Mills
What are the different ways of playing computer games in 2013? How might computer games evolve in your lifetime?
Lana Mills
An Inspector Calls: Sheila Birling
Rattan Bhorjee
Examen II Salesforce Developer
Youssef Ahmani
Input Devices
Kirsty Hary
How to make a mobile phone more user friendly for elderly and disabled people.
Lana Mills
Mobile phones can have health implications. Give examples of these.
Lana Mills
Advice on how to avoid accidents involving a computer.
Lana Mills
Forums
amyg367
Viruses!
1 Worm virus
1.1 This goes trough the network to get to other people
1.2 It will go through the hard drive and your memory to pass on to other computers.
1.3 Its aim is to cause as much damage as possible
2 Trojan virus
2.1 This doesn't inject into your computer
2.2 It looks like a real programme
2.3 It gives the person access to your computer
2.4 It is there to steel things
3 Malware
3.1 Short for malicious software
3.2 Created to disrupt computer operation, get sensitive information and gain access to private computer systems
3.3 Appears in the form of code or scripts
3.4 It is hostile, intrusive and and annoying software
4 Computer misuse act of 1990
4.1 This was created to stop people misusing computers
4.2 The law is there to stop people creating viruses and also hacking other peoples computers
5 Fraud
5.1 Fraud can be very complex or simple
5.2 Fraud is sending hoax emails to people to trick them
5.3 People sometimes pose as other people
5.4 They use spyware to gather the information
6 Cookies
6.1 Cookies download onto your computer
6.2 They track what you have been on and if you have a relevant cookie is there that they can use
6.3 Sends information back to the site
7 Phishing
7.1 This is to get peoples information
7.2 Phishing emails may contain links to websites that are infected with malware.
7.3 Makes it look like the real thing where it is really a fake
8 Spyware
8.1 This is malicious software which is implanted and installed in programes
8.2 The collect personal details, they also track what you enter on the internet
8.3 This makes it very easy to get your passwords and information
8.4 You normally don't know that there on your computer

Media attachments