OIM 210 Study Guide - Final Guide: Intrusion Detection System, Sql Injection, Breakcore

138 views3 pages

Document Summary

; setting off a series of false alarms that cause the victim to disable alarm systems; intimidation: malware seeks to compromise a computing system without permission. Client pcs and a firm"s servers are primary targets, but, malware now threatens nearly any connected system running software, including mobile phones, embedded devices, and a firm"s networking equipment. Some hackers will try to sneak via techniques like phishing. In another high-profile hacking example, infected usb drives were purposely left lying around government offices. They require a running program to spread, attaching to other program. Viruses can spread via operating systems, programs, or the boot sector or auto-run feature of media such as dvds or usb drives. Programs that take advantage of security vulnerability to automatically spread, but unlike viruses, worms do not require a program. Some worms scan for and install themselves on vulnerable systems with stunning speed. Trojans - try to sneak in by masquerading as something they"re not.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents