Symantec Norton 360 Antivirus Software 11022527 Manual Do Utilizador

Página de 584
These programs conceal
themselves on your PC. They
monitor what you do, or look
through the information that
is stored on your PC, and
send the information back to
their creators.
Spyware
These risks consist of flaws
in legitimate software that
can be exploited, either to
cause damage, block data, or
steal information.
Vulnerabilities are usually
exploited through network
connections.
Vulnerabilities
Types of threats
Threats consist of the software that has been
deliberately designed to destroy, modify, disclose, or
block your data.
Threats fall into the following categories:
Viruses are the small
programs that attach
themselves to other programs
and replicate themselves.
Viruses
Worms are like viruses in that
they copy themselves from
PC to PC, but they do not
attach themselves to other
programs.
Worms
Understanding alerts and messages
Types of threats
222