It 240 Threat Categorization

In: Computers and Technology

Submitted By jonnyfive
Words 367
Pages 2
Boot Sector contains has a limit of information which relates to the formatting of the disk, and has the boot program which loads the operating system.
File infector virus attaches to executable file with the COM or EXE extension.
Multipartite virus has both characteristics of boot sector and file virus.
Marco is a set of instruction which a program executes on command.
Trojan Horse virus is a program that appears to be legitimate software which is a game or utility and it will cause damage to the computer’s hard drive.
Email Worm come from pop ups ads and spyware through email.
Instant Messaging worms have a single propagation method.
IRC worms are a program that targets chat channels.
File-sharing networks worms copy themselves into a shared folder.
Internet worms use the internet to scan unprotected machines.

The boot sector virus loads onto the boot sector partition table of the hard drive spreads to all other programs that are used. File virus attaches or replaces the file name extensions in a file and spreads through the executable extensions of other files. Multipartite virus acts as both boot and files virus and attaches to machines as boot or file virus. Marco hides in an application than it is spread when active form a command in the application. Trojan Horse does not replicate itself but it appears as a legitimate software and when ran it will damage the hard drive and other memory stored devices. Email worm is attached through email from one to another and that is how it spreads. Instant messaging worms go through your contacts list and send them links to infected websites. IRC worms’ targets chat rooms or chat channels and that is how they spread also through emails they can spread. File-sharing network worms copy themselves onto the share folder on a local machine and when takes over infects all the network files from one user to…...

Similar Documents

It240 Check Point Threat Categorization

...Check Point Threat Categorization IT240 May 10, 2013 Check Point Threat Categorization |Define each of the following terms in your own words: | | | |Boot sector - Is the area of the computer that contains storage devices like hard drives, and is the area where the firmware and software boot from | |because the codes are located here. | |File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. | |Multipartite - divided or having many sectors, very applicable to computers since they have many parts and are divided into sectors and sections. | |Macro – Instructions, usually one that can automatically turn into more instructions. | |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored | |on the infected computer to be stolen. | |E-mail worms – A worm......

Words: 829 - Pages: 4

It/240

...February 4, 2013 IT/240 Domain Name When looking for a new domain name I would first start out with a search of a name that I like and would consider as the new site name. For example with the organization name being Free Flu, I would want to search that name and see what results come up. For the search I would sites such as Domain.com or godaddy.com to see if it was available to purchase.  After deciding on the name of the new site I would then try find out what address is available. When researching the domain name of Free Flu .com was already taken along with .org leaving .net as the only choice. In most circumstances .org would be the way to go as the .org address was for non-profit organizations. However all three are open for any person/ company/ organization to purchase. Finally choosing the amount of web pages or web servers would depend on the size of organization. Considering it is a non profit organization that gives the elderly people with the flu vaccine I would think that they would have limited funds to pay for things like this so some sites like Godaddy.com will provide a certain amount of webpages and web hosting for a fee when you purchase the domain name. In the pages they would need mission statements, a home, and a contact page at the very least for their pages. Then the web server is there to hold all of the organizations information such as volunteers or members, names of those that get the shots, when the last time they had a shot and the next...

Words: 304 - Pages: 2

I.T. 240 Threat Categorization

...Threat Categorization I.T. 240 Threat Categorization The boot sector is an area of the hard disk that has the startup information stored on it, it is also used to keep other key features on the disk working. A file is used in much the same way on a computer as in a physical setting. A file stores data that is used for whatever reason on the PC. Multipartite is a type of hybrid virus that combines more than one type of infection, they move fast and can infect the boot sector and program files at the same time, with that said we can picture the destruction that a multipartite can have on a system. The virus spreads throughout the system multiple times making even the simplest functions inoperable. A macro is a piece of code (information) data that is attached to a file, mainly word processors, such as Microsoft word, and Excel. Trojan horse in computers are programs that allow the execution of harmful actions that can delete data, block data, modify data, and disrupt networks. Trojan horses are like dormant cells that wait for the right time to make their appearance, they lay in wait most of the time in harmless programs. Email worms are spread through emails, they usually spread via attachment. These type of worms need to be opened before they can do anything. Worms can take up much needed memory and cause computers, web servers, and network servers to stop responding. Instant messaging worms are spread through instant......

Words: 490 - Pages: 2

It 240

...IT 240 Course Calendar | Monday | Tuesday | Wednesday | Thursday | Friday | Saturday | Sunday | Week 1 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | Post Bio | DQ 1 | | DQ 2 | LAN Operating Systems Scenarios CheckPoint | | | Week 2 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | | | OSI Model Key Terms TableCheckPoint | | | LAN Topologies | Week 3 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | DQ 1 | | DQ 2 | Network Consultant Scenario CheckPoint | | | Week 4 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | | | Toolwire Lab Exercise | TCP/IP LAN Plan CheckPoint | | TCP/IP Network Troubleshooting | Week 5 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | DQ 1 | | DQ 2 | Domain Name CheckPoint | | | Week 6 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | | | Vocabulary TableCheckPoint | Toolwire Lab Exercise | | Work Group Scenarios | Week 7 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | DQ 1 | | DQ 2 | | | | Week 8 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | | | | Threat Categorization CheckPoint | | Disaster Plan | Week 9 | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 | IT 240 | | | Capstone Discussion Question | | | | Final Project: LAN Consulting Plan | Academic Week | Day 1 |......

Words: 260 - Pages: 2

It/240

...LAN Topologies IT/240 Intro to LAN Technologies 4/29/2014 Farooq Afzal Case 3-1 In my opinion a client/server system with an extended star topology would be the best choice for Old-Tech Corporation. I would replace the 10 Mbps Ethernet cord with an 100 Mbps Ethernet cord to ensure a faster more reliable connection. The extended star topology will allow each computer to have access to shared files and the administrator can delegate which computer has access to which information within the network. I would make sure that we when we do the upgrade the computers are all connected with wireless NIC. Case 3-2 EBiz.com should be upgraded to have a Switched Logical Topology using an extended star topology. This network should be server based with several servers, each server would have its own task. The network should have at a minimum of 250 computers and have room for upgrades of 50 or more computers. I would install more switches to accommodate each floor of the building. This would be done for each floor with the servers having a room of their own. Case 3-3 For this Case Project I would suggest that ENorm set up the system as a Server Based computer system with Mesh Topology. We......

Words: 253 - Pages: 2

Common Information Security Threats

...Common Information Security Threats to Fundraising Organizations Klay C. Kohl CMGT/400 May 19, 2015 Robert Quintin Common Information Security Threats to Fundraising Organizations Introduction The advantages for fundraising organizations when integrating donor databases with their website are endless. Moreover, the security risk considerations from accessing online databases are an exponentially higher risk. These risks exist whether they are a small fundraising organization comprised mostly of volunteers or a Fortune 500 corporation. These risks fortunately, can be greatly reduced, and often, as in many cases, eliminated altogether when information security concerns are a priority in the design, implementation, and maintenance of the organizations offline access portal. In this article, we’d like to address some common security risks associated with database transactions online, discuss common technology behind these interactions, and describe controls that can be taken to mitigate the risks involved. Security concerns and the SDLC The system development life cycle (SDLC) commences with the initiation phase of the system planning process, continuing through system acquisition, development, implementation, and maintenance. Specific decisions about security must be made in each of these phases to assure that the system is secure.  During this initiation phase, organizations conduct a......

Words: 1404 - Pages: 6

Threats

...Threats of new entrants The threats of new entrants could recognized low due to several fact: The size of economies of scale and its main competitors,are very large. They have strong market power and capital to maintain their value. For the company, it has more than million servers located around the world to provide searching services to customers and obtain information from customers. Therefore, they understand the customer’s habits. Its main competitors are also not lag behind to improving their searching engines servers. It have high brand loyalty of users and it is famous that one of the strongest brand recognitions in the world. However, the switching cost is low. For users, other search engines were literally one click away. The barrier of entry is high so that if a new entrant would like to earner internet industry and would get successfully, it needs to have Sufficient of capital and technology that provide a better searching engine, and also must overcome the brand loyalty. Threats of exiting rivalry The threats of exiting rivalry have two parts, searching engines and advertising. For searching engines, the threats of exiting rivalry are low. The company have obviously competitive advantage. Its searching engines provide the best searching result and the fastest searching speed in the industry. But the good performance of searching engines is in order to acquire more advertisement that place at its website. It is not a only way for advertiser to place......

Words: 495 - Pages: 2

It 240 Complete Class

...IT 240 COMPLETE CLASS To purchase this visit here: http://www.activitymode.com/product/it-240-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM IT 240 COMPLETE CLASS IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES Activity mode aims to provide quality study notes and tutorials to the students of IT 240 COMPLETE CLASS in order to ace their studies. IT 240 COMPLETE CLASS To purchase this visit here: http://www.activitymode.com/product/it-240-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM IT 240 COMPLETE CLASS IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network......

Words: 553 - Pages: 3

It 240 Tutorial Absolute Tutors/It240Tutorial.Com

...IT 240 Entire Course FOR MORE CLASSES VISIT www.it240tutorial.com IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES ******************************************************** IT 240 Final Project: LAN Consulting Plan FOR MORE CLASSES VISIT www.it240tutorial.com Resources: Appendix A, Local Area Networks b. Due Date: Day 7 – Post to Assignments thread in Individual Forum c. Read Appendix A. d. Develop a plan to set up a local area network based on the scenario presented in Appendix A. e. Create a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan. f. Include “Speaker’s Notes” with slides (200 to 300 words total). g. Your plan should include three or more references (your text may count as one) h. Post your presentation as a Microsoft®......

Words: 540 - Pages: 3

It 240 Academic Success-Snaptutorial.Com

...IT 240 Entire Course For more classes visit www.snaptutorial.com IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES ------------------------------------------------------------------- IT 240 Week 1 Checkpoint: LAN Operating Systems Scenarios For more classes visit www.snaptutorial.com a. Resource: Appendix B b. Due Date: Day 5 – Post to Assignments thread in Individual Forum c. Read the three scenarios in Appendix B. d. Answer the questions following each scenario for a total of 200 to 300 words. e. Review Assignment and File Submission format instructions, page 7 of Syllabus --------------------------------------------------------------------- IT 240 Week 1 DQ 1 and DQ 2 For more classes visit www.snaptutorial.com Discussion Question 1 a. Due Date Day 2 – Post to DQ 1 thread in Main Forum b. Post......

Words: 574 - Pages: 3

It 240 Tutorial Real Education / It240Tutorial.Com

...IT 240 Entire Course FOR MORE CLASSES VISIT www.it240tutorial.com IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES ============================================== IT 240 Final Project: LAN Consulting Plan FOR MORE CLASSES VISIT www.it240tutorial.com Resources: Appendix A, Local Area Networks b. Due Date: Day 7 – Post to Assignments thread in Individual Forum c. Read Appendix A. d. Develop a plan to set up a local area network based on the scenario presented in Appendix A. e. Create a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan. f. Include “Speaker’s Notes” with slides (200 to 300 words total). g. Your plan should include three or more references (your text may count as one) h. Post your presentation as a Microsoft®......

Words: 953 - Pages: 4

It 240 Outlet the Learning Interface/It240Outletdotcom

...IT 240 Entire Course FOR MORE CLASSES VISIT www.it240outlet.com IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES …………………………………………………................ IT 240 Final Project: LAN Consulting Plan FOR MORE CLASSES VISIT www.it240outlet.com Resources: Appendix A, Local Area Networks b. Due Date: Day 7 – Post to Assignments thread in Individual Forum c. Read Appendix A. d. Develop a plan to set up a local area network based on the scenario presented in Appendix A. e. Create a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan. f. Include “Speaker’s Notes” with slides (200 to 300 words total). g. Your plan should include three or more references (your text may count as one) h. Post your presentation as a Microsoft® PowerPoint® attachment. i.......

Words: 954 - Pages: 4

It 240 Tutorial Learn by Doing/It240Tutorial.Com

...IT 240 Entire Course FOR MORE CLASSES VISIT www.it240tutorial.com IT 240 Week 1 Checkpoint LAN Operating Systems Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 2 Checkpoint OSI Model Key Terms IT 240 Week 3 Checkpoint Network Consultants Scenario IT 240 Week 3 DQ 1 and DQ 2 IT 240 Week 4 Checkpoint TCP/IP LAN Plan IT 240 Week 4 Assignment TCP/IP Network Troubleshooting IT 240 Week 5 Checkpoint Network Consultants Scenario IT 240 Week 5 DQ 1 and DQ 2 IT 240 Week 6 Checkpoint Vocabulary Table IT 240 Week 6 Assignment Work Group Scenarios IT 240 Week 1 DQ 1 and DQ 2 IT 240 Week 8 Checkpoint Threat Categorization IT 240 Week 8 Assignment Disaster Plan IT 240 Capstone Question IT 240 Final Project LAN Consulting Plan - PLEASE ADD OWN IMAGES ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IT 240 Final Project: LAN Consulting Plan FOR MORE CLASSES VISIT www.it240tutorial.com Resources: Appendix A, Local Area Networks b. Due Date: Day 7 – Post to Assignments thread in Individual Forum c. Read Appendix A. d. Develop a plan to set up a local area network based on the scenario presented in Appendix A. e. Create a boardroom-quality Microsoft® PowerPoint® presentation of 10-12 slides detailing your plan. f. Include “Speaker’s Notes” with slides (200 to 300 words total). g. Your plan should include three or more references (your text may count as one) h. Post your presentation as a......

Words: 953 - Pages: 4

Checkpoint 8 Threat Categorization

...Boot sector – the segment that has data information required for the computer to start up File – a set of information, but the place where viruses are attached from com or exe extensions Multipartite – a virus that has similarities of the boot sector and file virus Macro – instructions that causes a threat to the computer once it has been opened Trojan horse – a threat (or software), appears harmless, but once installed can erase the hard drive Email worms – worms that spread by the use of email. They spread through attachments, links, and popups Instant messaging worms – sends infected links to people listed in contacts IRC worms – infects the links to the infected user’s contacts through chatting File-sharing networks worms – the worm resides in a shared folder on computer and infects others using the same source Internet worms – hackers that scans the network for computers that aren’t protected to gain entrance to computers . The boot sector virus loads onto the boot sector partition table of the hard drive spreads to all other programs that are used. File virus attaches or replaces the file name extensions in a file and spreads through the executable extensions of other files. Multipartite virus acts as both boot and files virus and attaches to machines as boot or file virus. Marco hides in an application than it is spread when active form a command in the application. Trojan Horse does not replicate itself but it appears as a legitimate......

Words: 338 - Pages: 2

Threats

...20 THREATS 1 Since this is a pioneering, people might find it unusual to use a toothpaste in a chewable form. 2 Another challenge would be convincing the traditional toothbrush users to buy the product. 3 The biggest competitor would be the chewing gum companies. 4 There is a high potential that consumers will not use this product as a substitute product for toothpaste. 5 Possibility of slow market growth. 6 Possibility of product being a “fad” in the market. 7 The challenge of being universally accepted in the marketplace. 8 Once it enters the market, it can be easily duplicated. 9 There could be a low customer demand. 10 It would be difficult to penetrate the competitive market. 11 Doctors may still recommend toothpaste as the number one solution for oral treatment. 12 The need to have the positioning of product in the minds of the consumers would be hard to achieve. 13 Mouthwash companies can also be seen as one of the competitors. 14 Customers might not find the same satisfaction they get from tooth brushing. 15 The changing needs of the consumers are inevitable. 16 As a developing company, it requires a huge amount of effort to market the product. 17 The increasing number of counterfeits. 18 There could be a seldom buying in this product since people are used to brushing teeth. 19 Consumers especially generation X may perceived that it may cause cavity because of being a gum type. 20 It may be difficult for the company to achieve its desired...

Words: 267 - Pages: 2