Section Review 1.2 Copyright Goodheart-Willcox Co., Inc. Chapter 1 Introduction to Information Technology 25 Check Your Understanding 1. How does the World Wide Web relate to the Internet? 2. What serves as the user’s interface to the World Wide Web? 3. List the three Boolean operators that can be used in a search string. 4. How is phishing different from malware? 5. When is hacking legitimate? Build Your Vocabulary As you progress through this course, develop a personal IT glossary. This will help you build your vocabulary and prepare you for a career. Write a definition for each of the following terms and add it to your IT glossary. antivrus software Boolean operator browser censorship cookie data vandalism hacking hypertext markup langu age (HTML) malware packet phishing search engine Defending Against Cyber Attacks In the rapidly changing world of cyber attacks, it is a very good idea to run cyber-defense software. Cyber-defense software, usually called antivirus software, detects and removes malicious software from a computer. Most also actively prevent infections. Many companies offer cyber-defense software. Some are for-purchase and some are offered as freeware or open-source software. Some antivirus software always monitors for viruses, which is known as real-time protection. With some software, however, a scan must be manually started. If the antivirus software detects a virus, it should be removed as quickly as possible. Most antivirus software will remove the virus as soon as it is detected. In some cases, however, the user must manually tell the software to remove any virus that is found. This added step has the advantage of being able to tell the software that a particular file or program is safe, but this should be done only if you are certain the file is not infected. A file that antivirus software thinks is infected when, in fact, it is not is called a false positive. If for any reason a virus cannot be removed, it will be quarantined. This means the virus is isolated from the rest of the fi les on a computer. Once in quarantine, the virus cannot infect anything else. This is especially helpful if a critical fi le, such as a registry fi le, is infected. Cyber threats rapidly evolve. Therefore, the software must be regularly updated. In most cases, the software will check for updates at a set interval, such as once a day or once a week. In this way, the software can quickly respond to new threats. FYI Cyber-defense software may be called antivirus, antimalware, or antispyware software. It may be known by other names as well.
Previous Page Next Page