OIM 210 Study Guide - Final Guide: Intrusion Detection System, Sql Injection, Breakcore
Document Summary
; setting off a series of false alarms that cause the victim to disable alarm systems; intimidation: malware seeks to compromise a computing system without permission. Client pcs and a firm"s servers are primary targets, but, malware now threatens nearly any connected system running software, including mobile phones, embedded devices, and a firm"s networking equipment. Some hackers will try to sneak via techniques like phishing. In another high-profile hacking example, infected usb drives were purposely left lying around government offices. They require a running program to spread, attaching to other program. Viruses can spread via operating systems, programs, or the boot sector or auto-run feature of media such as dvds or usb drives. Programs that take advantage of security vulnerability to automatically spread, but unlike viruses, worms do not require a program. Some worms scan for and install themselves on vulnerable systems with stunning speed. Trojans - try to sneak in by masquerading as something they"re not.