Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 145

Implementation guide
Table of Contents

Advertisement

Viruses and security risks
Table 11-6
Risk
Viruses
Adware
Dialers
Hacking tools
Description
Programs or code that attach a copy of themselves to another
computer program or file when it runs. When the infected
program runs, the attached virus program activates and attaches
itself to other programs and files.
The following types of threats are included in the virus category:
Malicious Internet bots
Programs that run automated tasks over the Internet. Bots
can be used to automate attacks on computers or to collect
information from Web sites.
Worms
Programs that replicate without infecting other programs.
Some worms spread by copying themselves from disk to disk,
while others replicate in memory to reduce computer
performance.
Trojan horses
Programs that hide themselves in something benign, such as
a game or utility.
Blended threats
Threats that blend the characteristics of viruses, worms,
Trojan horses, and code with server and Internet
vulnerabilities to initiate, transmit, and spread an attack.
Blended threats use multiple methods and techniques to
spread rapidly and cause widespread damage.
Rootkits
Programs that hide themselves from a computer's operating
system.
Programs that deliver any advertising content.
Programs that use a computer, without the user's permission or
knowledge, to dial out through the Internet to a 900 number or
FTP site. Typically, these numbers are dialed to accrue charges.
Programs that hackers use to gain unauthorized access to a user's
computer. For example, one hacking tool is a keystroke logger,
which tracks and records individual keystrokes and sends this
information back to the hacker. The hacker can then perform
port scans or vulnerability scans. Hacking tools may also be used
to create viruses.
Managing Virus and Spyware Protection
Managing scans on client computers
145

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents