Symantec 11281411 Administration Guide - Page 90

Worms, Trojan horses, Blended threats, Spyware, Adware, Dialers, Joke programs, Remote access programs

Page 90 highlights

90 Scanning for viruses and other threats About threats ■ Worms: Programs that replicate without infecting other programs. Some worms spread by copying themselves from disk to disk, while others replicate only in memory to slow a computer down. ■ Trojan horses: Programs that contain code that is disguised as or hiding in something benign, such as a game or utility. ■ Blended threats: Threats that blend the characteristics of viruses, worms, Trojan horses, and code with server and Internet vulnerabilities. ■ Spyware: Stand-alone programs that can secretly monitor system activity and detect passwords and other confidential information and relay it back to another computer. ■ Adware: Stand-alone or appended programs that secretly gather personal information through the Internet and relay it back to another computer. Adware may track browsing habits for advertising purposes. Adware can also deliver advertising content. Spyware and adware can be unknowingly downloaded from Web sites (typically in shareware or freeware), email messages, and instant messenger programs. Often a user unknowingly downloads adware by accepting an End User License Agreement from a software program. ■ Dialers: Programs that use a computer, without the user's permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges. ■ Joke programs: Programs that alter or interrupt the operation of a computer in a way that is intended to be humorous or frightening. For example, a program can be downloaded from a Web site, email message, or instant messenger program. It can then move the Recycle Bin away from the mouse when the user attempts to delete it or cause the mouse to click in reverse. ■ Remote access programs: Programs that allow access over the Internet from another computer so that they can gain information or attack or alter a user's computer. For example, a program may be installed by the user, or installed as part of some other process without the user's knowledge. The program can be used for malicious purposes with or without modification of the original remote access program. ■ Hack tools: Programs used by a hacker to gain unauthorized access to a user's computer. For example, one hack tool is a keystroke logger, which tracks and records individual keystrokes and sends this information back to the hacker. The hacker can then perform port scans or vulnerability scans. Hack tools may also be used to create viruses.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

90
Scanning for viruses and other threats
About threats
Worms
: Programs that replicate without infecting other programs. Some
worms spread by copying themselves from disk to disk, while others
replicate only in memory to slow a computer down.
Trojan horses
: Programs that contain code that is disguised as or hiding in
something benign, such as a game or utility.
Blended threats
: Threats that blend the characteristics of viruses, worms,
Trojan horses, and code with server and Internet vulnerabilities.
Spyware:
Stand-alone programs that can secretly monitor system activity
and detect passwords and other confidential information and relay it back to
another computer.
Adware
: Stand-alone or appended programs that secretly gather personal
information through the Internet and relay it back to another computer.
Adware may track browsing habits for advertising purposes. Adware can
also deliver advertising content.
Spyware and adware can be unknowingly downloaded from Web sites
(typically in shareware or freeware), email messages, and instant
messenger programs. Often a user unknowingly downloads adware by
accepting an End User License Agreement from a software program.
Dialers
: Programs that use a computer, without the user’s permission or
knowledge, to dial out through the Internet to a 900 number or FTP site,
typically to accrue charges.
Joke programs
: Programs that alter or interrupt the operation of a computer
in a way that is intended to be humorous or frightening. For example, a
program can be downloaded from a Web site, email message, or instant
messenger program. It can then move the Recycle Bin away from the mouse
when the user attempts to delete it or cause the mouse to click in reverse.
Remote access programs
:
Programs that allow access over the Internet from
another computer so that they can gain information or attack or alter a
user’s computer. For example, a program may be installed by the user, or
installed as part of some other process without the user's knowledge. The
program can be used for malicious purposes with or without modification of
the original remote access program.
Hack tools
: Programs used by a hacker to gain unauthorized access to a
user’s computer. For example, one hack tool is a keystroke logger, which
tracks and records individual keystrokes and sends this information back to
the hacker. The hacker can then perform port scans or vulnerability scans.
Hack tools may also be used to create viruses.