-
Software Threats
Software Threats
Software interactions are a significant source of problems; but these are inadvertant. Software attacks (logic bombs, Trojans, worms and viruses) are deliberate and can als...
-
Virus Threats
Virus Threats
A virus reproduces, usually without your permission or knowledge. In general terms they have an infection phase
where they reproduce widely and an attack phase where they do whatever da...
-
Hardware Threats
Hardware Threats
Hardware is a common cause of data problems. Power can fail, electronics age, add-in boards can be installed wrong,
you can mistype, there are accidents of all kinds, a repair techni...
-
File Viruses
File Viruses
While more in number, file infectors are not the most commonly found. They infect in a variety of ways and can be found in a large number of file types.
In terms of sheer number of v...
-
Attack Phase
BACK
Attack Phase
Viruses need time to infect. Not all viruses attack, but all use system resources and often have bugs.
Viruses usually delay revealing their presence ...
-
Infection Phase
BACK
Infection Phase
Virus writers have to balance how and when their viruses infect against the possibility of being detected. Therefore, the spread of an inf...