Preview

It240 Check Point Threat Categorization

Satisfactory Essays
Open Document
Open Document
829 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It240 Check Point Threat Categorization
Check Point Threat Categorization

IT240
May 10, 2013

Check Point Threat Categorization
|Define each of the following terms in your own words: |
| |
|Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from |
|because the codes are located here. |
|File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. |
|Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. |
|Macro – Instructions, usually one that can automatically turn into more instructions. |
|Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |
|on the infected computer to be stolen. |
|E-mail worms – A worm that spreads through the user of the user’s email account(s). |
|Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to |
|spread itself. |
|IRC worms – A worm that spreads through the use of Internet Relay

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Spam is expected to increase to 80 to 90 percent of total email. New viruses turn desktop PCs into spam-spewing "zombies." There is also a new type of spamming technique called "phishing," used to dupe recipients into providing confidential personal identity information. You can expect the occurrence of these spam-virus hybrids to increase and develop into even more dangerous and damaging threats…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Email Bomb Attacks

    • 102 Words
    • 1 Page

    One variation on the mail bomb automatically subscribes a targeted user to hundreds or thousands of high volume Internet mailing lists, which fill the user’s mailbox and / or mail server. Bombers call this attack list linking. Examples of these mail bomb programs comprises of Unabomber, Extreme Mail, Avalanche, Voodoo, and Kaboom.…

    • 102 Words
    • 1 Page
    Good Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Infection and spread: Using the Tenex operating system and ARPANET, a self-replicating virus spread between DEC PDP 10 systems displaying the message, “I’M THE CREEPER CATCH ME IF YOU CAN”.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Web Security Issues

    • 911 Words
    • 4 Pages

    This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.…

    • 911 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Danger of Malware

    • 839 Words
    • 4 Pages

    Computer worms and viruses pose a clear and present danger for corporate and public information security in that as time and technology progress, the damaging effects this "malware" has on the network increases. Throughout this paper the term "malware" is used to define software that damages your system, causes instability, or exhibits antisocial behavior such as changing settings or interfering with a computer's registry and security settings. Typical examples include computer viruses or worms.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sending e-mail bombs (hundreds of messages per second) from randomly generated false addresses. The recipient’s internet service provider e-mail server is overloaded and shuts down.…

    • 1096 Words
    • 5 Pages
    Good Essays
  • Good Essays

    These are software programs and they once they are installed or copied to a computer system, can open doors for further malicious, illegal or unauthorized actions. Trojan Horses apparently look harmless, however, they can be doing something dangerously wrong in the background. ‘Happy99.exe’ is a Trojan Horse that after displaying firework, sends its copies to email addresses found on the system.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    sector. The definitions in use depend on the purposes these are required to serve according to the…

    • 8033 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    outline

    • 730 Words
    • 3 Pages

    In fact, when we surf the Web, read e-mail, and download software, a hidden program is called a Trojan chat, can send to our computer without our knowing. It will steal and transfer all the information that we already saved. After that, this person may make use of it to others. (Hansen, B.2002)…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Worms

    • 594 Words
    • 3 Pages

    Computer worms are classified as a type of computer virus, but there are several characteristics that distinguish computer worms from regular viruses. A major difference is the fact that viruses spread through human activity (running a program, opening a file and such) while computer worms have the ability to spread automatically without human initiation. In addition to being able to spread without a person, computer worms have the ability to self-replicate. This means that a worm can create more than one copy of itself to send to other computers. This often happens through the sending of chain e-mails to infected users’ email contacts. What is a worm intended to do? It depends on the person who created the worm. Usually a worm is created to gather personal information from a host. It may also create what we call a ‘backdoor’, which lets the creator of the worm to control the host or simply delete all data from it.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Top 20 Most Active Viruses

    • 2089 Words
    • 9 Pages

    • A virus that also has the characteristics of a worm. • It inserts its code in other files and programs. It has damaging effects on the affected computer. • It spreads and affects other computers by creating copies of itself. • It does not spread automatically using its own means. It needs the attacking user's intervention in order to reach the affected computer. The means of transmission used include, among others, floppy disks, CD-ROMs, email messages with attached files, Internet downloads, FTP, IRC channels, peer-to-peer (P2P) file sharing networks, etc.…

    • 2089 Words
    • 9 Pages
    Good Essays
  • Better Essays

    How Stuff Works, Inc (2013). How do viruses and worms spread in e-mail? Retrieved from…

    • 2028 Words
    • 9 Pages
    Better Essays
  • Good Essays

    What are worms? Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. The difference is that unlike viruses, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms are…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Internet & Email Threats

    • 1178 Words
    • 5 Pages

    A program that infects a computer by attaching itself to another program, and propagating itself when that program is executed. A computer can become infected by files downloaded over a network, or by the installation of new software or floppy disks that are infected with viruses as well as email attachments. Some viruses are only pranks, and perform harmless actions like displaying a screen with a joke message on it. Others can destroy files or wipe out a hard drive.…

    • 1178 Words
    • 5 Pages
    Good Essays

Related Topics