This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Sends infected website links to anyone on a local contact list through an instant messaging application. IRC worms Attack chat channels and also send infected links to any of the local infected user’s contacts. File-sharing network worms This type of worm resides in a shared folder on a local machine and infects any user that downloads the resource. Internet worms Scan the network for any unprotected computers to gain access to the machine in which they can create a backdoor for hackers. In week seven I researched clickjacking and I feel it fits into the Trojan horse category since it pretends to be a real resource and perform a certain function the user wouldn’t think twice about performing. After the user executes the resource it starts to perform malicious acts and can open a backdoor for a hacker to get into the user’s computer and steal information....
View Full Document
- Spring '11
- Instant messaging, Computer virus, Boot sector, Computer worm, threat categorization