ICT 351 Lecture Notes - Lecture 8: Port Scanner, Adware, Botnet

15 views4 pages

Document Summary

Any attempt at unauthorized access to a system or to deny legit users access to the system. Ex: ping sweep; scans lots of machines if they are alive or not. Step 2: penetrate the defense (the perimeter network) Helps the attacker reenter the system with minimal efforts. Step 4: circulate to other systems and networks. Any program, proceeding executable file that can make unauthorized changes to the system or trigger unauthorized actions. Enters a computer system without user"s knowledge, then performs unwanted/harmful action. Two types of malware with the goal of spreading: Virus (needs a host and user action) Worms (self replicates; you don"t need a host) Malicious code objects have one thing in common: payload. Payload: code that performs the malicious act. Malicious computer code that reproduces itself on the same computer. A virus attaches itself to a computer file. Virus appends itself to end of a file. Moves first three bytes of original file to virus code.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents