My New Mind Map

Get Started. It's Free
or sign up with your email address
Rocket clouds
My New Mind Map by Mind Map: My New Mind Map

1. Malware

1.1. Type of software

1.2. Made to infect other peoples computer

1.3. Doesn't need a person's permission in order to activate itself

1.4. Usually designed to cause your computer to run slow

1.5. Some can re-install itself even after you think you have completely removed it

1.6. It can multiply

1.7. Much more easier to get it then to get rid of it

1.8. Just like a virus, in the sense that it infects your computer, but malware doesn't need you to "open it", it automatically does it.

2. How To Prevent Malware

2.1. Make your computer notify you every time, a program is trying to be downloaded onto your computer

2.2. Have a anti-virus program installed onto your computer

2.2.1. Have it updated regulary.

2.3. Install a pop-up blocker

2.3.1. This can prevent malware from being downloaded

2.4. Don't download programs or software from unknown sites, chances are they contain malware

2.5. Be careful when you are sharing your files with others

2.5.1. If the orginal computer contained malware, and you shared something with another user, that computer can get infected too.

2.5.2. Why ? Malware muliplies, it can implant itself on a disk or file

2.6. Read the fine print on what you are downloading

2.6.1. Most of the time people don't read the fine print on what they download

2.6.2. Sometimes you are allowing the program to install malware onto your computer

3. How People Get Malware

3.1. Usually comes in a bundle with other programs

3.1.1. Such as Kaazaa, Imesh etc

3.1.2. Some pretend to be applications that you need to download first in order to view the website

3.1.3. Some can install themselves through holes on the Internet

3.1.3.1. When you enter the infected site, you get infected too

4. Internet Security

4.1. Includes personal information

4.2. Always keep it to yourself

4.3. Don't share it with anyone

4.4. Involves the protection of a computer and it's information to unknown users

4.5. Basic Security: Choosing a strong password, changing file permissions, and having a backup or a computer's data

4.6. When have accounts such as e-mail, or online banking, or ebay accounts for example, make sure to choose a strong password

4.7. Virus + Worm

4.7.1. They are both made to infect your computer

4.7.2. Easier to receive then to get rid of

4.7.3. Virus needs someone to "open" it or activate it

4.7.4. Worm automatically opens itself

5. Hacking

5.1. Nowadays, countries such as China and Russia are recruiting young hackers

5.2. A trojan horse can be sold for $400-$1000