Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
3
-
2
The Range and Types of Internet Threats
Over the years, as the Internet has developed, so too has the creation of a wide range
of Internet threats, collectively known as “malware.” There are thousands of known
viruses, and virus writers are creating more each day. In addition to viruses, new
threats designed to exploit vulnerabilities in corporate email systems and Web sites
continue to emerge. Typical types of malware include the following:
T
ABLE
3-1.
Types of Internet threats
Threat Type
Characteristics
Bot
Bots are compressed executable files that are often designed to
harm computer systems and networks. Bots, once executed, can
replicate, compress, and distribute copies of themselves. Typical
uses of malicious bots are Denial-of-Service attacks, which can
overwhelm a Web site and make it unusable.
Pharming
Similar in nature to email phishing, pharming seeks to obtain per-
sonal or private information (usually financially related) through
domain spoofing.
Phishing
Phishing is the use of unsolicited email to request user verifica-
tion of private information, such as credit card or bank account
numbers, with the intent to commit fraud.
Spam
Unsolicited, undesired bulk email messages that frequently use
various tricks to bypass email filtering.
Spyware
Technology that aids in gathering information about a person or
organization.
Trojan
Malware that performs unexpected or unauthorized—often mali-
cious—actions. Trojans cause damage and unexpected system
behavior and compromise system security, but unlike viruses,
they do not replicate.
Virus
A program that carries a destructive payload and that replicates,
spreading quickly to infect other systems. Viruses remain one of
the most prevalent threats to computing.
Worm
A self-contained program or set of programs that is able to
spread functional copies of itself or its segments to other com-
puter systems, typically via network connections or email attach-
ments.
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...