Week 8 Checkpoint- Threat Categorization

Week 8 Checkpoint- Threat Categorization - Sends infected...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Running head: THREAT CATEGORIZATION 1 Threat Categorization Stephen D, James IT 240 Jennifer Gonzales October 14, 2011 University of Phoenix (Axia College)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
THREAT CATEGORIZATION 2 Threat Categorization Term Definition Boot Sector Data sectors on a hard drive that perform the boot process. File A resource containing information or data that is stored on a computer. Multipartite Virus that spreads multiple ways that used to hit DOS files and Boot files. Macro A sequence that carries out a certain procedure usually all automatically. Trojan horse A computer threat that pretends to perform a certain function but instead performs malicious acts undisclosed to the user. Can open a backdoor for a hacker to exploit the user’s computer. Email worms These are worms that spread via email. These worms may spread themselves through attachments or links and once launched are become a threat to the computer. Instant messaging worms
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Sends infected website links to anyone on a local contact list through an instant messaging application. IRC worms Attack chat channels and also send infected links to any of the local infected users contacts. File-sharing network worms This type of worm resides in a shared folder on a local machine and infects any user that downloads the resource. Internet worms Scan the network for any unprotected computers to gain access to the machine in which they can create a backdoor for hackers. In week seven I researched clickjacking and I feel it fits into the Trojan horse category since it pretends to be a real resource and perform a certain function the user wouldnt think twice about performing. After the user executes the resource it starts to perform malicious acts and can open a backdoor for a hacker to get into the users computer and steal information....
View Full Document

This note was uploaded on 01/25/2012 for the course UOP uop taught by Professor Jones during the Spring '11 term at University of Phoenix.

Page1 / 2

Week 8 Checkpoint- Threat Categorization - Sends infected...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online