Network Security Thereats

What is Viruses ?
Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event

Trojan horse programs :
Delivery vehicles for destructive code, which appear to be harm lessor useful software programs such as games

Vandals :
Software applications or applets that cause destruction

Attacks :
Including reconnaissance attacks (information-gathering activities to collect data thatis later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks(which prevent access to part or all of a computer system)

Data interception :
Involves eavesdropping on communications or altering data packets being transmitted

Social engineering :
Obtaining confidential network security information through non technical means, such as posing as a technical support person and asking for people's passwords


Print   Email