Ch 15: Computer Threats & Security

About This Chapter

Access this computer science chapter at any time to study the foundations of computer threats and security. Inside, you'll find short lessons and quizzes that can be used as textbook supplements, homework help tools and test preparation resources.

Computer Threats & Security - Chapter Summary

Follow along with our expert instructors to learn about computer threats and the security measures that are taken to avoid/manage them. These engaging lessons and self-assessments cover the basics of computer viruses, computer hacking, phishing scams, computer security policies, privacy protection methods and much more. The chapter is available to study at any time, and you can use any computer or mobile device to access these resources. Our instructors are also happy to answer any questions you may have about these concepts. When you're finished with the lessons and quizzes, you should be able to:

  • Compare types of computer viruses
  • Provide a description of computer hackers
  • Define the concept of mousetrapping
  • Assess examples of phishing and denial of service attacks
  • Outline the basics of computer security
  • Compare different types of computer security and network security
  • Evaluate computer security policies
  • Describe the role of firewalls in network security
  • Discuss privacy and protection in Internet security

11 Lessons in Chapter 15: Computer Threats & Security
Test your knowledge with a 30-question chapter practice test
What is a Computer Virus? - Definition, Types & Protection

1. What is a Computer Virus? - Definition, Types & Protection

In this lesson, we'll discover the nature of computer viruses and how they are commonly spread. We'll look at the types of viruses, protection schemes, and some real-life examples.

What is a Hacker? - Definition & Overview

2. What is a Hacker? - Definition & Overview

This lesson describes what a hacker is. Although we associate a hacker with an individual hacking a computer or network system, there are actually three different types of hacker, all with different goals and objectives.

Mousetrapping in Computer Security: Definition

3. Mousetrapping in Computer Security: Definition

In this lesson, we will define mousetrapping and the features on a website that constitute this malicious practice. We will examine some of the implications.

What is a Denial of Service (DoS) Attack? - Definition, Types & Examples

4. What is a Denial of Service (DoS) Attack? - Definition, Types & Examples

In this lesson, we will describe a Denial of Service (DoS) and a Distributed Denial of Service (DDoS) attack and identify how these attacks occur. We will also discuss the objectives of an attack and some guidelines on how to prevent or limit the impacts of a DoS or DDoS attack.

What is Phishing? - Definition, Examples & Awareness

5. What is Phishing? - Definition, Examples & Awareness

Phishing is the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. This lesson discusses different types of phishing schemes, as well as the social, legal, and technological responses to these growing threats.

What is Computer Security? - Definition & Basics

6. What is Computer Security? - Definition & Basics

This lesson defines computer security as a part of information security. It describes hardware, software, and firmware security. Common practices for implementing computer security are also included.

Types of Computer Security

7. Types of Computer Security

From financial records to national defense, computers play a critical role in many activities, and with this power comes the need for security. In this lesson, you'll learn about the different types of computer security and controlling access from inside and out.

Computer Security Policies Examples

8. Computer Security Policies Examples

This lesson provides an explanation as to how and why a policy is formed as a basis for understanding the driving forces behind computer security policies. Common computer security policies and examples are discussed.

Types of Network Security

9. Types of Network Security

Network security is a fundamental concept that is essential to any company using information technology. This lesson lists a few of the common types of network security systems and describes their role on the network.

What is a Firewall in Network Security? - Role & Use

10. What is a Firewall in Network Security? - Role & Use

The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.

What is Internet Security? - Privacy, Protection & Essentials

11. What is Internet Security? - Privacy, Protection & Essentials

The Internet provides a wealth of information and services, but also presents certain risks. Learn about the various security threats and way to make your online activities more secure and enjoyable.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support