Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

B. Simplicity -

c. Threat Agent - is a person or thing that has the power to carry out a threat.

4.

1. Worm -A program that is designed to take advantage of a vulnerability in an application

or an operating system in order to enter a system.

2. Trojan Horse -A program advertised as performing one activity but actually does

something else, or it may perform both the advertised and malicious activities.

3. Malware -Malicious software that enters a computer system without the owner’s knowledge

or consent.

4. Root Kit -A set of software tools used by an intruder to break into a computer, obtain

special privileges to perform unauthorized functions, and then hide all traces of its

existence.

5. Logic Bomb -A computer program or a part of a program that lies dormant until it is triggered

by a specific logical event.

6. Virus -A program that secretly attaches itself to a legitimate “carrier,” such as a document

or program, and then executes when that document is open or the program is launched.

7. Spam -Unsolicited e-mail.

8. Privilege Escalation -The act of exploiting a vulnerability in the software to gain access to

resources that the user would normally be restricted from obtaining.

9. Spyware -A general term used to describe software that violates a user’s personal

security.

10. Adware -A software program that delivers advertising content in a manner that is unexpected

and unwanted by the user.

11. Key logger -A small hardware device or a program that monitors each keystroke a user types

on the computer’s keyboard.

12. Botnets -A group of zombie computers that are under the control of an attacker.

Internet Relay Chat (IRC) -

14. Zombie -

5.

Data Execution Prevention (DEP) –is afeature that prevents attackers from using buffer

overflow to execute malware.

Address Space Layout Randomization(ASLR) -defense

mechanism that makes it harder for malicious code to exploit system functions is Address

Space Layout Randomization (ASLR). Whenever a Windows Vista computer is turned on or

rebooted, ASLR randomly assigns executable operating system code (such as.EXE programs

and dynamic link libraries or.DLLs) to one of 256 possible locations in memory. This makes

it harder for an attacker to locate and take advantage of any functionality inside these executables.

6.

D. SMTP - 25

E. POP3 - 110

F. IMAP - 143

g. P2P –

H. IM

I. Packet Filter

7.

Antivirus -Software that can scan a computer for infections as well as monitor computer

activity and scan all new documents, such as e-mail attachments, that might contain a virus.

Popup Blocker -

Anti-Spam -

Firewall -


Дата добавления: 2015-11-16; просмотров: 62 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
A. Obscurity -| Методические указания.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)