Section Review Section Revieweiv Re w
1.2 1.2
Copyright Goodheart-Willcox Co., Inc.
Chapter 1 Introduction to Information Technology 25
Check Your Understanding
1. How does the World Wide Web relate to the
Internet?
2. What serves as the user’s interface to the World
Wide Web?
3. List the three Boolean operators that can be used
in a search string.
4. How is phishing different from malware?
5. When is hacking legitimate?
Build Your Vocabulary
As you progress through this course, develop a
personal IT glossary. This will help you build your
vocabulary and prepare you for a career. Write a
definition for each of the following terms and add it to
your IT glossary.
antivrus software
Boolean operator
browser
censorship
cookie
data vandalism
hacking
hypertext markup
language (HTML)
malware
packet
phishing
search engine
Defending Against Cyber Attacks
In the rapidly changing world of cyber attacks, it is a very good idea
to run cyber-defense software. Cyber-defense software, usually called
antivirus software, detects and removes malicious software from a
computer. Most also actively prevent infections. Many companies offer
cyber-defense software. Some are for-purchase and some are offered as
freeware or open-source software.
Some antivirus software always monitors for viruses, which is
known as real-time protection. With some software, however, a scan must
be manually started. If the antivirus software detects a virus, it should
be removed as quickly as possible. Most antivirus software will remove
the virus as soon as it is detected. In some cases, however, the user must
manually tell the software to remove any virus that is found. This added
step has the advantage of being able to tell the software that a particular
file or program is safe, but this should be done only if you are certain the
file is not infected. A file that antivirus software thinks is infected when,
in fact, it is not is called a false positive.
If for any reason a virus cannot be removed, it will be quarantined.
This means the virus is isolated from the rest of the fi les on a computer. fi
Once in quarantine, the virus cannot infect anything else. This is
especially helpful if a critical fi le, such as a registry file, fi is infected. fi
Cyber threats rapidly evolve. Therefore, the software must be
regularly updated. In most cases, the software will check for updates at a
set interval, such as once a day or once a week. In this way, the software
can quickly respond to new threats.
FYI FYI
Cyber-defense software
may be called antivirus,
antimalware, or
antispyware software. It
may be known by other
names as well.
Previous Page Next Page