CEH
Trojans, Viruses, Worms, and Covert Channels CEH EXAM TOPICS COVERED IN THIS CHAPTER: ✓ I. Background ■ E. Malware operations ✓ ...
One of the prominent problems that has emerged with the spread of technology is malware. Malware is a term that covers viruses, ...
Malware 181 In past decades, what we now call malware was not so vicious in nature; it was more benign. Software in this class w ...
182 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels What enabled this breach? Initial reports point strongly to the fac ...
Malware 183 The Patriot Act This act expanded on the powers already included in the Computer Fraud and Abuse Act. The law provid ...
184 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Each of these types of malware has its own traits, which you explor ...
Malware 185 Design. The author envisions and creates the virus. The author may choose to create the virus completely from scrat ...
186 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels ■ Four short years later, the first PC-compatible virus debuted. Th ...
Malware 187 ■ Macro viruses debuted in force around 2000. They take advantage of embedded languages such as Visual Basic for App ...
188 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels ■ A logic bomb is designed to lie in wait until a predetermined eve ...
Malware 189 How to Create a Virus Creating a virus is a process that can be very complicated or something that happens with a fe ...
190 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Outside of computing, the term sheep dip refers to farmers’ practic ...
Malware 191 The Functioning of Computer Worms Worms are an advanced form of malware, compared to viruses, and have different goa ...
192 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels With these abilities in mind, it is important to distinguish worms ...
Malware 193 ■ Freeware—Downloading software for free from unknown or untrusted sources can mean that you also download something ...
194 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Scareware has become more common over the last few years as users h ...
Malware 195 Operations that could be performed by a hacker on a target computer system include these: ■ Stealing data ■ Installi ...
196 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels Types of Trojans include the following: ■ Remote access Trojans (RA ...
Malware 197 ■ NetMeeting Remote: TCP 49608/49609 ■ pcAnywhere: TCP 5631/5632/65301 ■ Reachout: TCP 43188 ■ Remotely Anywhere: TC ...
198 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels EXERCISE8.3 (continued) To use TCPView, follow these steps: In Win ...
«
7
8
9
10
11
12
13
14
15
16
»
Free download pdf