Professional Documents
Culture Documents
ch02
ch02
Detection
Chapter Two
Introduction to Computer Viruses &
Vulnerabilities
Objectives
• Explain the component parts of computer virus and
vulnerabilities in general
• Define the key terms and critical concepts of
computer virus and vulnerabilities
• Describe the types of computer virus and
vulnerabilities
1. Crimeware is distributed
2. Infiltrates/Infects a computer platform
3. Crimeware Executes
– Scan the user’s hard drive for sensitive information
– Intercept the user’s keystrokes
– Transmits collected information
• Directly to the attacker
• Indirectly to the attacker via a misused legitimate
server
– Man-in-the-Middle Attack
• Intrusion
– Meant to gain unauthorized access to a system through a
breach in the security of that network or machine on the
network.
• Blocking
– These are attacks designed to prohibit legitimate traffic or
access to the network resources. (e.g. DoS, DDoS)
• Malware
– Software with a malicious intent that is installed on a machine.
This software includes all viruses, worms, trojan horses, etc.
This is the most common threat to all types of users connected
to a network or the Internet.