For the Week ending 03/03/06
Directions: Choose the word that matches with the definition and appropriately fits into the blank space in the sentence.
This threat serves up unwanted advertising material on your PC.
When Jim downloaded a free software programs that seemed quite unique, he had no idea that he was agreeing to receive _______ in exchange. |
An individual who attempts to access your PC by sniffing out, then using your passwords. They often use special software to crunch thousands of password combinations until they find the right one.
There are many _______ who sit for hours every day searching for vulnerable computers - in order obtain passwords and sell them to cyber-thieves. |
This threat sends out e-mail designed to look like official communications from banks; online payment services or credit card companies - in order to get unsuspecting individuals to divulge personal information and financial data.
You should never respond to any e-mail asking you to update personal information - since it's probably from a _______. |
Once downloaded, this threat can track user information on individual systems. It can follow your web surfing habits, or try to sniff out your passwords or other personal information. It's one of the greatest threats today and can slow your computer down to a crawl.
It's important to protect yourself thouroughly from _______, since it's one of the most widely used threats on the internet today. |
This threat causes damage by spreading over as many computers as possible through means of hi-jacking your e-mail client list and sending itself to every person in your address book.
_______ use the art of deception by sending infections to all those in your address book using your e-mail address. |