Home
Flashcards
Preview
ITM 431 Ch. 3
Home
Get App
Take Quiz
Create
You cannot defend yourself unless you know the threat environment you face
Malware
General name for evil software
Vulnerabilities are security flaws in specific programs
Vulnerability-specific malware requires a specific vulnerability to be effective
Universal Malware does not require a specific vulnerability to be effective
What types of threats are most feared by IT security professionals
Insider Threats
Unpatched Vulnerability
Next-Generation Malware
There are three types of Malware
Trojan Virus Worm
Virus
Code that attaches to other programs
executes when program executes
can travel through email, websites, social networking, USB Ram Sticks, peer to peer sharing
Stopping viruses
antivirus programs scan filesĀ
patching may or may not help
Worms
Stand-alone programs that do not need attachment
can propagate like viruses through email which requires human gullibility
Antivirus programs search for worms as well as viruses
Directly propagating worm jump to victim hosts directly
can only do this with specific vulnearblity
amazing speed
can be thwarted by firewalls and installing patches
not by antivirus programs
normal propagate virus can be stopped by antivirus and sometimes patches
directly propagating worms cannot be stopped by antivirus and can be stopped by firewalls and patches
Trojan Horse
programs that disguise themselves as system files
spyware trojans collect sensitive data send data to attacker
Website activity trackersĀ
keystroke loggers
data mining software
Author
jo73
ID
334417
Card Set
ITM 431 Ch. 3
Description
fad
Updated
2017-09-20T03:49:32Z
Show Answers
Home
Flashcards
Preview