Symantec 10490452 Administration Guide - Page 70

Security risks, Table 4-4, Category, Description

Page 70 highlights

70 Configuring email filtering About email filtering Security risks Symantec Mail Security for SMTP can detect security risks. Security risks are programs that do any of the following: ■ Provide unauthorized access to computer systems ■ Compromise data integrity, privacy, confidentiality, or security ■ Present some type of disruption or nuisance These programs can put your employees and your organization at risk for identity theft or fraud by logging keystrokes, capturing email and instant messaging traffic, or harvesting personal information, such as passwords and login identifications. Security risks can be introduced into your system unknowingly when users visit a Web site, download shareware or freeware software programs, click links or attachments in email messages, or through instant messaging clients. They can also be installed after or as a by-product of accepting an end user license agreement from another software program related to or linked in some way to the security risk. Table 4-4 lists the categories of security risks that Symantec Mail Security for SMTP detects. Each of these risks can cause a verdict of spyware or adware. Table 4-4 Security risk categories included in spyware or adware verdict Category Description Adware Stand-alone or appended programs that gather personal information through the Internet and relay it back to a remote computer without the user's knowledge. Adware might monitor browsing habits for advertising purposes. It can also deliver advertising content. Hack tools Programs used to gain unauthorized access to a user's computer. For example, a keystroke logger tracks and records individual keystrokes and sends this information to a remote computer. The remote user can perform port scans or vulnerability scans. Hack tools might also be used to create viruses. Dialers Programs that use a computer, without the user's permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges. Joke programs Programs that alter or interrupt the operation of a computer in a way that is intended to be humorous or bothersome. For example, a joke program might move the Recycling Bin away from the mouse when the user tries to click on it.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258

70
Configuring email filtering
About email filtering
Security risks
Symantec Mail Security for SMTP can detect security risks. Security risks are
programs that do any of the following:
Provide unauthorized access to computer systems
Compromise data integrity, privacy, confidentiality, or security
Present some type of disruption or nuisance
These programs can put your employees and your organization at risk for
identity theft or fraud by logging keystrokes, capturing email and instant
messaging traffic, or harvesting personal information, such as passwords and
login identifications.
Security risks can be introduced into your system unknowingly when users visit
a Web site, download shareware or freeware software programs, click links or
attachments in email messages, or through instant messaging clients. They can
also be installed after or as a by-product of accepting an end user license
agreement from another software program related to or linked in some way to
the security risk.
Table 4-4
lists the categories of security risks that Symantec Mail Security for
SMTP detects. Each of these risks can cause a verdict of spyware or adware.
Table 4-4
Security risk categories included in spyware or adware verdict
Category
Description
Adware
Stand-alone or appended programs that gather personal information
through the Internet and relay it back to a remote computer without the
user’s knowledge.
Adware might monitor browsing habits for advertising purposes. It can
also deliver advertising content.
Hack tools
Programs used to gain unauthorized access to a user’s computer.
For example, a keystroke logger tracks and records individual keystrokes
and sends this information to a remote computer. The remote user can
perform port scans or vulnerability scans. Hack tools might also be used
to create viruses.
Dialers
Programs that use a computer, without the user’s permission or
knowledge, to dial out through the Internet to a 900 number or FTP site,
typically to accrue charges.
Joke programs
Programs that alter or interrupt the operation of a computer in a way
that is intended to be humorous or bothersome.
For example, a joke program might move the Recycling Bin away from
the mouse when the user tries to click on it.