What is Viruses ?
Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs :
Delivery vehicles for destructive code, which appear to be harm lessor useful software programs such as games
Vandals :
Software applications or applets that cause destruction
Attacks :
Including reconnaissance attacks (information-gathering activities to collect data thatis later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks(which prevent access to part or all of a computer system)
Data interception :
Involves eavesdropping on communications or altering data packets being transmitted
Social engineering :
Obtaining confidential network security information through non technical means, such as posing as a technical support person and asking for people's passwords