Preview

It240 Check Point Threat Categorization

Satisfactory Essays
Open Document
Open Document
829 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It240 Check Point Threat Categorization
Check Point Threat Categorization

IT240
May 10, 2013

Check Point Threat Categorization
|Define each of the following terms in your own words: |
| |
|Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from |
|because the codes are located here. |
|File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. |
|Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. |
|Macro – Instructions, usually one that can automatically turn into more instructions. |
|Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |
|on the infected computer to be stolen. |
|E-mail worms – A worm that spreads through the user of the user’s email account(s). |
|Instant messaging worms – A worm that can replicate it’s self and uses the user’s buddy list and address book on an instant messaging application to |
|spread itself. |
|IRC worms – A worm that spreads through the use of Internet Relay

You May Also Find These Documents Helpful

  • Satisfactory Essays

    13) What worm was released in 2001 and primarily defaced web sites? C) Code Red…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    A Database is generally used for storing data in a structured way in an efficient manner for insert, update and retrieval of data in well defined formats. On the other hand, in file system the data stored in unstructured manner with an unrelated data.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Email: Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    e. Computer files, programs, or software that allow files to be shared via the internet (peer-to-peer clients, email programs, or FTP programs).…

    • 808 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    File – A resource within a computer’s main memory. It is used to store several types of information.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Computers store data ondisks using files, which are structured in specific ways in order to allow for faster access, higher reliability, and to make better use out of the drive's available space. The specific way in which files are stored on a disk is called a file system, and enables files to have names and attributes. It also allows them to be stored in a hierarchy of directories or folders arranged in a directory tree.…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    C) FTP (File transfer protocol) - is a standard way of gathering files between computers on the Internet over IP/TCP…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * A resource for storing information, which is available to a computer program, which can also sometimes make the information, stored inside readable by humans.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Love Bug Research Paper

    • 1326 Words
    • 6 Pages

    They don’t know the half of it. The worm is where crap really hits the fan if you will. Going back to our best friend the love bug, that was actually a worm and not a virus. The biggest difference between the two,“A worm is a standalone program that doesn’t require user intervention to spread. Worms don’t infect existing files – they spread copies of themselves instead.” (Hoffman, 2012.) Meaning it does not need a host to leach onto spread. Also worms can be remotely accessed and used, viruses cannot. Worms typically use holes in the operating systems and back doors. Viruses need human interaction to be spread across computers whether it be sending a file by way of email or putting a file on a thumb drive. Though it does need to be physically transferred. In terms of how bad they are to a system and or network though it does differ. “Worms that spread over the network can generate a large amount of traffic, slowing down the network.” (Hoffman, 2012) A worm will make things run very slow may even make your computer restart multiple times. A virus can do similar things but a virus will corrupt files on your hard drive even possibly erase the entire thing. From what I’ve read granted the worm effects a lot more computers which for networked computers it would be a nightmare. I will have to say the virus sounds more dangerous. If your computer isn’t backed up or the important files are saved…

    • 1326 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Web Security Issues

    • 911 Words
    • 4 Pages

    This paper will discuss methods to address client security issues. It will include ways that a Website can be attacked by malicious users. It will discuss how Java script insertion, SQL insertion, hidden field manipulation, header manipulation, and cookies may be used by malicious users. It will discuss how worms and viruses can be introduced to a Website, and the most common method to ensure client security.…

    • 911 Words
    • 4 Pages
    Better Essays
  • Better Essays

    How Stuff Works, Inc (2013). How do viruses and worms spread in e-mail? Retrieved from…

    • 2028 Words
    • 9 Pages
    Better Essays
  • Good Essays

    outline

    • 730 Words
    • 3 Pages

    In fact, when we surf the Web, read e-mail, and download software, a hidden program is called a Trojan chat, can send to our computer without our knowing. It will steal and transfer all the information that we already saved. After that, this person may make use of it to others. (Hansen, B.2002)…

    • 730 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Worms

    • 594 Words
    • 3 Pages

    Computer worms are classified as a type of computer virus, but there are several characteristics that distinguish computer worms from regular viruses. A major difference is the fact that viruses spread through human activity (running a program, opening a file and such) while computer worms have the ability to spread automatically without human initiation. In addition to being able to spread without a person, computer worms have the ability to self-replicate. This means that a worm can create more than one copy of itself to send to other computers. This often happens through the sending of chain e-mails to infected users’ email contacts. What is a worm intended to do? It depends on the person who created the worm. Usually a worm is created to gather personal information from a host. It may also create what we call a ‘backdoor’, which lets the creator of the worm to control the host or simply delete all data from it.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    sector. The definitions in use depend on the purposes these are required to serve according to the…

    • 8033 Words
    • 33 Pages
    Powerful Essays

Related Topics