Domain 6.0 Security

Domain 6.0 Security - A+ Study Guide: Domain 6.0: Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
A+ Study Guide: Domain 6.0: Security - Security Threats Introduction: Previous versions of the A+ exams contained very little about security , however, the new exam gives it a weighting of 11%. This is because the incedence and sophistication of attacks continues to increase and may be responsible for many of the issues that a technician deals with. There are a wide variety of security threats out there from hacking to disgruntled employees to poor internal security design. In this section, we will take a look at some of the various threats. Spam: If you don't know what spam is, you haven't spent enough time with computers to be considering taking this exam. The amount of spam users are receiving continues to grow every year. It costs businesses dearly in employee labor hours, network bandwidth, not to mention the costs if malicious payload is executed. Viruses: The most common computer infestation, viruses rely on other programs such as an email client to replicate themselves. There are several different categories of viruses as follows: File infector viruses - File infector viruses infect executable program files such as .com and .exe files. They can infect other files when an infected program is run from floppy, hard drive, or from the network. Boot sector viruses - Boot sector viruses infect the system area of a disk known as the boot record. Master boot record viruses - Master boot record viruses are memory resident viruses that infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. These can often be fixed by using FDISK /MBR. Multi-partite viruses - Infect both boot records and program files. Macro viruses: These types of viruses infect data files and are the most common. With the advent of Visual Basic in Microsoft's Office 97, a macro virus can be written that not only infects data files, but also can infect other files as well. There are 2 other types of attacks that are common via the use of Trojans and Worms as described below: Trojan Horse - A Trojan is a type of file that appears to do one thing, but in reality does another. A Trojan can be a file that operates in an expected way, but also has a secret operation that subverts security. Once a Trojan is installed, it can perform a wide variety of destructive tasks and/or provide secure information to the attacker. Worms - Worms are stand alone programs that do not need other programs in order to replicate themselves like a virus which relies on users to inadvertently spread it. Most viruses are spread via email and the internet, but can also be spread via removable media (i.e. floppies) or across a network. Spyware, Adware, and Grayware:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/22/2010 for the course CIT 601 taught by Professor Reems during the Spring '10 term at University of Tennessee.

Page1 / 15

Domain 6.0 Security - A+ Study Guide: Domain 6.0: Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online