Table 11-6
Viruses and security risks
Description
Risk
Programs or code that attach a copy of themselves to another
computer program or file when it runs. When the infected
program runs, the attached virus program activates and attaches
itself to other programs and files.
The following types of threats are included in the virus category:
■
Malicious Internet bots
Programs that run automated tasks over the Internet. Bots
can be used to automate attacks on computers or to collect
information from Web sites.
■
Worms
Programs that replicate without infecting other programs.
Some worms spread by copying themselves from disk to disk,
while others replicate in memory to reduce computer
performance.
■
Trojan horses
Programs that hide themselves in something benign, such as
a game or utility.
■
Blended threats
Threats that blend the characteristics of viruses, worms,
Trojan horses, and code with server and Internet
vulnerabilities to initiate, transmit, and spread an attack.
Blended threats use multiple methods and techniques to
spread rapidly and cause widespread damage.
■
Rootkits
Programs that hide themselves from a computer's operating
system.
Viruses
Programs that deliver any advertising content.
Adware
Programs that use a computer, without the user's permission or
knowledge, to dial out through the Internet to a 900 number or
FTP site. Typically, these numbers are dialed to accrue charges.
Dialers
Programs that hackers use to gain unauthorized access to a user's
computer. For example, one hacking tool is a keystroke logger,
which tracks and records individual keystrokes and sends this
information back to the hacker. The hacker can then perform
port scans or vulnerability scans. Hacking tools may also be used
to create viruses.
Hacking tools
145
Managing Virus and Spyware Protection
Managing scans on client computers
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...