About This Chapter
Computer Threats & Security - Chapter Summary
Follow along with our expert instructors to learn about computer threats and the security measures that are taken to avoid/manage them. These engaging lessons and self-assessments cover the basics of computer viruses, computer hacking, phishing scams, computer security policies, privacy protection methods and much more. The chapter is available to study at any time, and you can use any computer or mobile device to access these resources. Our instructors are also happy to answer any questions you may have about these concepts. When you're finished with the lessons and quizzes, you should be able to:
- Compare types of computer viruses
- Provide a description of computer hackers
- Define the concept of mousetrapping
- Assess examples of phishing and denial of service attacks
- Outline the basics of computer security
- Compare different types of computer security and network security
- Evaluate computer security policies
- Describe the role of firewalls in network security
- Discuss privacy and protection in Internet security
1. What is a Computer Virus? - Definition, Types & Protection
In this lesson, we'll discover the nature of computer viruses and how they are commonly spread. We'll look at the types of viruses, protection schemes, and some real-life examples.
2. What is a Hacker? - Definition & Overview
This lesson describes what a hacker is. Although we associate a hacker with an individual hacking a computer or network system, there are actually three different types of hacker, all with different goals and objectives.
3. Mousetrapping in Computer Security: Definition
In this lesson, we will define mousetrapping and the features on a website that constitute this malicious practice. We will examine some of the implications.
4. What is a Denial of Service (DoS) Attack? - Definition, Types & Examples
In this lesson, we will describe a Denial of Service (DoS) and a Distributed Denial of Service (DDoS) attack and identify how these attacks occur. We will also discuss the objectives of an attack and some guidelines on how to prevent or limit the impacts of a DoS or DDoS attack.
5. What is Phishing? - Definition, Examples & Awareness
Phishing is the practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. This lesson discusses different types of phishing schemes, as well as the social, legal, and technological responses to these growing threats.
6. What is Computer Security? - Definition & Basics
This lesson defines computer security as a part of information security. It describes hardware, software, and firmware security. Common practices for implementing computer security are also included.
7. Types of Computer Security
From financial records to national defense, computers play a critical role in many activities, and with this power comes the need for security. In this lesson, you'll learn about the different types of computer security and controlling access from inside and out.
8. Computer Security Policies Examples
This lesson provides an explanation as to how and why a policy is formed as a basis for understanding the driving forces behind computer security policies. Common computer security policies and examples are discussed.
9. Types of Network Security
Network security is a fundamental concept that is essential to any company using information technology. This lesson lists a few of the common types of network security systems and describes their role on the network.
10. What is a Firewall in Network Security? - Role & Use
The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.
11. What is Internet Security? - Privacy, Protection & Essentials
The Internet provides a wealth of information and services, but also presents certain risks. Learn about the various security threats and way to make your online activities more secure and enjoyable.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 103: Computer Concepts & Applications course
- Basic Computer Concepts
- Computer Hardware Components & Functions
- Application & System Software
- Operating Systems for Computers
- Telecommunications Systems
- Understanding Computer Files
- Troubleshooting Computer Issues
- Web Browsers & Technology
- Using Microsoft Word
- Using Microsoft Excel
- Using Microsoft PowerPoint
- Database Fundamentals
- Computer Programming Fundamentals
- Systems Development & Analysis
- Technology's Ethical, Legal & Privacy Issues