BTM 200 Lecture Notes - Lecture 19: Rootkit, Botnet, Three-Cushion Billiards
Document Summary
A kit is the malware secretly introduced into the computer. Blended threats can use server and internet vulnerabilities to initiate, then transmit and also spread an attack. A logic bomb is detonated when a specific event occurs for example, all personnel records are erased when an electronic notation is made that a particular person was fired. Email bombs overwhelm a person"s email account by surreptitiously subscribing it to dozens or even hundreds of mailing lists: phone malware: worms and viruses and other malware are attacking smartphones. The most common type of cellphone infection occurs when a cellphone downloads an infected file from a. Pc or the internet, but phone-to-phone viruses are also on the rise: infected files usually show up disguised as applications such as games, security patches, add-on functionalities, and free stuff. Check security updates to learn about filenames to watch out for.