Chapter02 - Security+ Guide to Network Security...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Describe the different types of software-based attacks List types of hardware attacks Define virtualization and explain how attackers are targeting virtual systems 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition Software-Based Attacks Malicious software, or malware Software that enters a computer system without the owner’s knowledge or consent Malware is a general term that refers to a wide variety of damaging or annoying software The three primary objectives of malware To infect a computer system Conceal the malware’s malicious actions Bring profit from the actions that it performs 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Infecting Malware Viruses Programs that secretly attach to another document or program and execute when that document or program is opened Once a virus infects a computer, it performs two separate tasks Replicates itself by spreading to other computers Activates its malicious payload Cause problems ranging from displaying an annoying message to erasing files from a hard drive or causing a computer to crash repeatedly 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition Infecting Malware (continued) 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Infecting Malware (continued) Types of computer viruses File infector virus Resident virus Boot virus Companion virus Macro virus Metamorphic viruses Avoid detection by altering how they appear Polymorphic viruses Also encrypt their content differently each time 6
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition Infecting Malware (continued) Worm Program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system Worms are different from viruses in two regards: A worm can travel by itself A worm does not require any user action to begin its execution Actions that worms have performed: deleting files on the computer; allowing the computer to be remote- controlled by an attacker 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Concealing Malware Trojan Horse (or just Trojan ) Program advertised as performing one activity that but actually does something else Trojan horse programs are typically executable programs that contain hidden code that attack the computer system Rootkit A set of software tools used by an intruder to break into a computer, obtain special privileges to perform unauthorized functions, and then hide all traces of its existence 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition Suggestion Reconfigure your system to display file extensions. Open Windows Explorer.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 53

Chapter02 - Security+ Guide to Network Security...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online