BTM 200 Lecture Notes - Lecture 19: Rootkit, Botnet, Three-Cushion Billiards

8 views2 pages

Document Summary

A kit is the malware secretly introduced into the computer. Blended threats can use server and internet vulnerabilities to initiate, then transmit and also spread an attack. A logic bomb is detonated when a specific event occurs for example, all personnel records are erased when an electronic notation is made that a particular person was fired. Email bombs overwhelm a person"s email account by surreptitiously subscribing it to dozens or even hundreds of mailing lists: phone malware: worms and viruses and other malware are attacking smartphones. The most common type of cellphone infection occurs when a cellphone downloads an infected file from a. Pc or the internet, but phone-to-phone viruses are also on the rise: infected files usually show up disguised as applications such as games, security patches, add-on functionalities, and free stuff. Check security updates to learn about filenames to watch out for.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents