Preview

It240 - Week 8 Definitions

Satisfactory Essays
Open Document
Open Document
437 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It240 - Week 8 Definitions
Marquita Sparks
IT240 – Week 8
Threat Categorization

Boot Sector – A part of the hard drive that contains a machine code that is loaded into the RAM by the firmware of a computer.
File – A resource within a computer’s main memory. It is used to store several types of information.
Multipartite – A computer virus that can infect a system and spread in a number of ways.
Macro – A pattern that instructs how an input sequence should be mapped to coincide with a replacement input sequence.
Trojan horse – A type of malware that cannot self-replicate, and appears to do one action, but instead infects the computer with malicious payloads.
Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.
Instant Messaging (IM) worms – A worm that can attach itself to a computer system when a user clicks on a link through an instant messaging window.
IRC (Internet Relay Chat) worms – a program that can spread through message forums and/or internet chat rooms by sending infected files or web addresses to users.
File Sharing worms – worms that are programmed to replicate themselves through peer-2- peer (P2P)j file sharing networks, such as KaZaA, Frostwire, Morpheus, etc.
Internet worms – A worm that self-replicates and self-distributes copies of itself to its host network.

The threat I researched in week 7 was a Trojan horse. It is not a self-replicating threat, but it attaches itself to the cookies and temporary internet file folders of a users’ browser history. It re-routes a user’s log in to a malicious web address. By doing this, it causes users to click on other links that further spreads harmful malware, adware, and spyware to their systems, without them even knowing it. The only way to prevent this is to completely clear your cache, cookies, and temporary internet files folders every time you end an Internet browsing session. Running checks through an anti-virus program can also clean these

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | d. A worm can replicate itself and does not need a host for distribution.…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    13) What worm was released in 2001 and primarily defaced web sites? C) Code Red…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    file system An operating system component that provides a means for storing and organizing files so that users can easily locate…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    e. Computer files, programs, or software that allow files to be shared via the internet (peer-to-peer clients, email programs, or FTP programs).…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    completed a scan of the entire computer, learned how to exclude folders to avoid false positives,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Enforcing rules through software that monitors and records IM conversations, and also through disciplinary action.…

    • 5657 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Trojan horse is a legitimate program that has been altered by the placement of unauthorized instructions within it. These instructions perform functions unknown to (and probably unwanted by) the user. They are not virus and do not replicate like virus. They are complete application, are not attached themselves. This is the main idea and function of the Trojan horse program.…

    • 1243 Words
    • 5 Pages
    Good Essays