01:198:110 Lecture 4: oct 6

56 views4 pages
tanmarten476 and 2 others unlocked
01:198:110 Full Course Notes
35
01:198:110 Full Course Notes
Verified Note
35 documents

Document Summary

The first examples of malware were known as viruses. Michelangelo in 1992- little damage; lots of hype. A program that attaches itself to a file, reproduced and spreads from one file to another. Malicious programs that can destroy data files and damage your computer. Self replicating program that enters network through security holes. Unlike a virus, a worm does not need to attach to another program. Can hard a network, at minimum it consumes bandwidth. A program that appears to perform a legitimate function while actually doing something else, such as stealing a password. Presented as useful or harmless to induce the user to install and run. Dos: denial of service perpetrator uses a single internet connection to either exploit a software vulnerability or floor a target with fake requests. Distributed dos: comes from multiple pc"s, harder to trace, botnets. Launched from multiple connected devices that are distributed across the internet.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents