Table 11-6
Viruses and security risks
Description
Risk
Programs or code that attach a copy of themselves to another
computer program or file when it runs. When the infected
program runs, the attached virus program activates and attaches
itself to other programs and files.
The following types of threats are included in the virus category:
■
Malicious Internet bots
Programs that run automated tasks over the Internet. Bots
can be used to automate attacks on computers or to collect
information from Web sites.
■
Worms
Programs that replicate without infecting other programs.
Some worms spread by copying themselves from disk to disk,
while others replicate in memory to reduce computer
performance.
■
Trojan horses
Programs that hide themselves in something benign, such as
a game or utility.
■
Blended threats
Threats that blend the characteristics of viruses, worms,
Trojan horses, and code with server and Internet
vulnerabilities to initiate, transmit, and spread an attack.
Blended threats use multiple methods and techniques to
spread rapidly and cause widespread damage.
■
Rootkits
Programs that hide themselves from a computer's operating
system.
Viruses
Programs that deliver any advertising content.
Adware
Programs that use a computer, without the user's permission or
knowledge, to dial out through the Internet to a 900 number or
FTP site. Typically, these numbers are dialed to accrue charges.
Dialers
Programs that hackers use to gain unauthorized access to a user's
computer. For example, one hacking tool is a keystroke logger,
which tracks and records individual keystrokes and sends this
information back to the hacker. The hacker can then perform
port scans or vulnerability scans. Hacking tools may also be used
to create viruses.
Hacking tools
145
Managing Virus and Spyware Protection
Managing scans on client computers
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...