Symantec Norton 360 Multi-Device, 5U Manual Pagina 240

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 618
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 239
These risks consist of flaws
in legitimate software that
can be exploited, either to
cause damage, block data, or
steal information.
Vulnerabilities are usually
exploited through network
connections.
Vulnerabilities
Types of threats
Threats consist of the software that has been
deliberately designed to destroy, modify, disclose, or
block your data.
Threats fall into the following categories:
Viruses are the small
programs that attach
themselves to other programs
and replicate themselves.
Viruses
Worms are like viruses in that
they copy themselves from
PC to PC, but they do not
attach themselves to other
programs.
Worms
These destructive programs
claim to be some other type
of program, but they cause
damage when they run.
Trojan horses
Norton 360 scans your PC for viruses, worms, Trojan
horses, and other software that is intentionally
destructive. It also monitors your Internet connection
to protect you from the Internet-based threats that
exploit software vulnerabilities.
Understanding alerts and messages
Types of threats
240
Vista de pagina 239
1 2 ... 235 236 237 238 239 240 241 242 243 244 245 ... 617 618

Comentarios a estos manuales

Sin comentarios