Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
3
-
2
The Range and Types of Internet Threats
Over the years, as the Internet has developed, so too has the creation of a wide range
of Internet threats, collectively known as “malware.” There are thousands of known
viruses, and virus writers are creating more each day. In addition to viruses, new
threats designed to exploit vulnerabilities in corporate email systems and Web sites
continue to emerge. Typical types of malware include the following:
T
ABLE
3-1.
Types of Internet threats
Threat Type
Characteristics
Bot
Bots are compressed executable files that are often designed to
harm computer systems and networks. Bots, once executed, can
replicate, compress, and distribute copies of themselves. Typical
uses of malicious bots are Denial-of-Service attacks, which can
overwhelm a Web site and make it unusable.
Pharming
Similar in nature to email phishing, pharming seeks to obtain per-
sonal or private information (usually financially related) through
domain spoofing.
Phishing
Phishing is the use of unsolicited email to request user verifica-
tion of private information, such as credit card or bank account
numbers, with the intent to commit fraud.
Spam
Unsolicited, undesired bulk email messages that frequently use
various tricks to bypass email filtering.
Spyware
Technology that aids in gathering information about a person or
organization.
Trojan
Malware that performs unexpected or unauthorized—often mali-
cious—actions. Trojans cause damage and unexpected system
behavior and compromise system security, but unlike viruses,
they do not replicate.
Virus
A program that carries a destructive payload and that replicates,
spreading quickly to infect other systems. Viruses remain one of
the most prevalent threats to computing.
Worm
A self-contained program or set of programs that is able to
spread functional copies of itself or its segments to other com-
puter systems, typically via network connections or email attach-
ments.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...