This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Sends infected website links to anyone on a local contact list through an instant messaging application. IRC worms Attack chat channels and also send infected links to any of the local infected users contacts. File-sharing network worms This type of worm resides in a shared folder on a local machine and infects any user that downloads the resource. Internet worms Scan the network for any unprotected computers to gain access to the machine in which they can create a backdoor for hackers. In week seven I researched clickjacking and I feel it fits into the Trojan horse category since it pretends to be a real resource and perform a certain function the user wouldnt think twice about performing. After the user executes the resource it starts to perform malicious acts and can open a backdoor for a hacker to get into the users computer and steal information....
View Full Document
This note was uploaded on 01/25/2012 for the course UOP uop taught by Professor Jones during the Spring '11 term at University of Phoenix.
- Spring '11