ICT 351 Lecture Notes - Lecture 8: Port Scanner, Adware, Botnet
Document Summary
Any attempt at unauthorized access to a system or to deny legit users access to the system. Ex: ping sweep; scans lots of machines if they are alive or not. Step 2: penetrate the defense (the perimeter network) Helps the attacker reenter the system with minimal efforts. Step 4: circulate to other systems and networks. Any program, proceeding executable file that can make unauthorized changes to the system or trigger unauthorized actions. Enters a computer system without user"s knowledge, then performs unwanted/harmful action. Two types of malware with the goal of spreading: Virus (needs a host and user action) Worms (self replicates; you don"t need a host) Malicious code objects have one thing in common: payload. Payload: code that performs the malicious act. Malicious computer code that reproduces itself on the same computer. A virus attaches itself to a computer file. Virus appends itself to end of a file. Moves first three bytes of original file to virus code.